Articles By Howard Solomon

programming keyboard shutterstock

New OWASP Top 10 list of Web application vulnerabilities released

Every three years the Open Web Application Security Project (OWASP) has the unenviable task of compiling a list of the...

November 22nd, 2017 Howard Solomon

Tips for tuning a SIEM

Drowning in logs from firewalls, Windows, network switches, Wi-Fi routers and the like? System information and event management (SIEM) suites...

November 21st, 2017 Howard Solomon
Graphic of a spy on a keyboard

Kaspersky says internal investigation proves its software hasn’t been tampered with

How trustworthy are security products from Russia-based Kaspersky? The question was raised last month in two stories from the Wall...

November 20th, 2017 Howard Solomon

Build playbooks to meet emerging threats, SecTor conference told

Infosec leaders in private sector critical infrastructure firms need to have reaction playbooks ready to face cyber attacks if they...

November 17th, 2017 Howard Solomon

Focus on security basics and be good at them, says risk consultant

CISOs often dream about adding hands to the infosec team to ease their burden. However, a risk management consultant says...

November 16th, 2017 Howard Solomon

Government regulation of IoT coming, SecTor conference told

Government safety regulation of the Internet of Things is coming, warns a prominent security expert, so technologists have to start...

November 16th, 2017 Howard Solomon

Canada’s new cyber security strategy will be based on 5 principles: Senior official

A senior Canadian government official has given a conference of infosec pros a peek at the coming updated federal cyber...

November 15th, 2017 Howard Solomon

Why networking, not just work on networks, helps an infosec career

You’ve spent years writing code, configuring networks and racking up certifications. But getting to know people is the kind of...

November 15th, 2017 Howard Solomon

How to stop fraud

During the summer the accounting department at Edmonton’s Grant McEwan University received an email request from a local construction firm...

November 14th, 2017 Howard Solomon
Password Prompt

Phishing kits best way for attackers to get credentials, says study

There are billions of stolen credentials available for purchase on the black market dating back perhaps 20 years. Their value...

November 10th, 2017 Howard Solomon