Security rules strain Canadian, U.S. IT contractors looking for federal work

News last week that a cyber attack at a third-party firm that performs background checks for U.S. government employees had compromised data of at least 25,000 bureaucrats is just the latest illustration of how attackers can gain

Published on: August 27th, 2014 Howard Solomon

Think your corporate search engine is big? Look at the NSA’s

It was in the mid 1980s that I read James Bamford's inside look at the National Security Agency, The Puzzle Palace, which outlined how the NSA vacuums up huge amounts of electronic data.

Published on: August 27th, 2014 Howard Solomon

The demise of excess access: A eulogy for traditional VPN

Once upon a time, in a world where mobile meant "laptop" or "remote home PC", Corporate network connectivity came in two flavours: dial-up modem, with it's clunky protocols and achingly slow speeds, and

Published on: August 26th, 2014 Michael Ball

Video interview: Check Point Software’s Amnon Bar-Lev

Let’s face it: 2014 has been a miserable year for IT security professionals. Every week, it seems, an organization somewhere around the world confesses its systems have been broken into and data has

Published on: August 26th, 2014 Howard Solomon

How to protect Secure Shell access

A considerable number of Canadian IT departments rely on the Secure Shell protocol for automating access management thanks to it being embedded in a wide number of IT, networking and security products. Its

Published on: August 25th, 2014 Howard Solomon

U.S. warns on POS systems

Canadian CSOs in the retail sector need to be aware of a warning issued Friday by US-CERT that the Backoff point of sale malware continues to be a threat in the sector. Seven

Published on: August 25th, 2014 Howard Solomon

How BES 10 works for me

There is still so much coverage these days about BlackBerry on a comeback trail, ready to take on the Apple iPhone and Android devices. There’s little doubt in my mind that BlackBerry will

Published on: August 25th, 2014 Chris Lau

German researchers first to get Facebook’s Internet Defense Prize

The best way to solve a problem is throw money at it, some people argue. In IT security one way of doing that is buy offering bug bounties. Facebook -- a co-sponsor of the

Published on: August 22nd, 2014 Howard Solomon

Another warning about Android apps

A security vendor has raked the Google Play store and the Android ecosystem over the coals for allowing apps that have SSL vulnerabilities  susceptible to man in the middle attacks to be made

Published on: August 21st, 2014 Howard Solomon