Warning issued for online tracking tools

The ability to deliver targeted advertising to customers is one of the great advantages of the Internet. What organization doesn't want to make sure its message gets out to the best buyers? But

Published on: July 22nd, 2014 Howard Solomon

How the Nasdaq was hacked

There have been lots of reports that governments around the world aren't paying enough attention to protecting their critical infrastructure -- telecom networks, water systems and power grids -- from cyber attacks. Stock markets would

Published on: July 18th, 2014 Howard Solomon

A tool for Canadian SME’s in their battle to improve cyber-security

According to Industry Canada’s 2012 analysis of small and medium enterprises in Canada, over 7.7 million employees, or 69.7 percent of the total private labour force, worked for small businesses; 2.2 million employees,

Published on: July 17th, 2014 Dave O'Leary

Juniper stiffens DDoS defence

Denial of service attacks are among the most frustrating that IT security pros can face. On the one hand, no corporate data is at risk; on the other hand the organization is shut

Published on: July 17th, 2014 Howard Solomon

Many Canadian security pros would rip up their architecture

Ever feel like tearing down your organization's IT security architecture and starting all over again? You're not alone. Nearly one-third (30 per cent) of Canadian security pros surveyed by security vendor Websense recently

Published on: July 17th, 2014 Howard Solomon

Flaw in Active Directory puts enterprises at risk, says vendor

A startup Israeli security vendor says it has found an encryption vulnerability in Microsoft's Active Directory it says could allow an attacker to change user passwords. "The potential for this particular vulnerability to cause

Published on: July 15th, 2014 Howard Solomon

Researchers give a red light to Web-based password managers

If you're like me, you have at least a dozen online passwords to keep track of. For work alone there are five I need almost daily. IT security pros following best practices insist

Published on: July 14th, 2014 Howard Solomon

Another attack on iPhone security

CSOs who allow staff to use iPhones on their networks -- and that includes a lot of Canadian organizations -- may be wondering what to do about the latest accusation about potential holes

Published on: July 14th, 2014 Howard Solomon

How up to date is your insider threat program?

Recent IT security story headlines have focused on network breaches that have led to the capture of millions of pieces of personally-identifiable data. However, insider threats are still a prime source of problems

Published on: July 14th, 2014 Howard Solomon