71080359

Eight per cent of your partners may be a high security risk: Study

One of the weakest links in an organization's IT security may be the most obvious: The telecom provider. That's one...

March 31st, 2015 Howard Solomon

Leslie Lambert, CISO of Gurucul. ITWC photo by Howard Solomon

Advice to CSOs: Have a sense of humour

The CSO is probably the most besieged person in organizations today, as the network faces daily attack from either outside...

March 30th, 2015 Howard Solomon

information security mind map

Another warning about using public Wi-Fi

Wi-Fi is a tremendous communications boon, allowing users of desktop and mobile devices great flexibility. But like all wireless technologies,...

March 27th, 2015 Howard Solomon

Data breach notification in Canada

Cisco issues fixes for IOS/IOS XE software

Cisco Systems has released seven security notes with a range of software fixes for network devices that run its IOS and IOS...

March 26th, 2015 Howard Solomon

Image from
Shutterstock.com

Many Canadian banks target of attack, says security vendor

Fifteen Canadian financial institutions have been targeted by new a malware attack aimed at stealing passwords, says a Danish security...

March 25th, 2015 Howard Solomon

AA045492

Bearing up under the pressure

Any well-prepared CSO has a range of defensive weapons deployed in the environment to meet the widely varied threats out...

March 24th, 2015 Howard Solomon

security and privacy issues

Expert Bruce Schneier: It’s hard not to despair over the state of IT security

The more things change the more they stay the same, goes an old saying. That certainly seems to be true...

March 23rd, 2015 Howard Solomon

bandaid, fix, repair

OpenSLL fixes potential DoS bugs

OpenSSL needs to be patched again. The open source project team said Thursday that version 1.0.2 of its toolkit for...

March 20th, 2015 Howard Solomon

Image from Shutterstock.com

Service to offer free TLS certificates

If they haven't already done it, organizations are increasingly turning to encryption to protect sensitive data. But they also need...

March 20th, 2015 Howard Solomon