Friday, January 21, 2022
HomePrivacy & Security

Privacy & Security

Zero Trust Security Assessment

Businesses of every size are more concerned about cybersecurity than ever before. New threats emerge daily. Remote workers, cloud architectures, and an explosion of smart devices introduce new vulnerabilities.

3Com upgrades embedded firewall

The newest version of 3Com's Embedded Firewall Solutions includes Linux support, better scalability for large domains and enhanced security features, the company said Monday.

Embedding security smarts

Imagine you're responsible for the IT operations of a company that relies on the Internet to sell products around the world. Now imagine that...

Hackers take advantage of security holes

The software vulnerability that was exploited by this week's Witty worm is only the latest on a growing list of flaws that are being...

NetScreen goes modular with its firewall/VPN gear

NetScreen Technologies Inc. this week will roll out a security box that plugs a gap in its current firewall/VPN product line and introduced modular hardware that will let users more easily add security functions such as intrusion prevention.

Microsoft issues flood of critical patches

Microsoft Corp. on Tuesday released a flood of information on new and previously disclosed holes in a wide range of software products, many of them rated "critical" and well-suited to use by malicious hackers or computer virus writers, according to one security expert.

Could N.Z. become a spam haven?

New Zealand has rocketed to become the third-largest producer of spam in the region, according to anti-spam company Brightmail Inc.

Foundry launches switches to help block attacks

Foundry Networks Inc. Monday announced modular and stackable switches for Layer 4-7 tasks, with a particular focus on corporate security requirements. ...

MS to settle with InterTrust for US$440M

Less than two weeks after settling its legal disputes with Sun Microsystems Inc., Microsoft Corp. said on Monday that it reached an agreement with InterTrust Technologies Corp. to settle a long-running case over InterTrust's digital rights management software.

Network is only as secure as you want it to be

VPNs, firewalls, and anti-virus are the big three of security. But the dirty little secret is that a lot of this software and hardware exists more to CYA than to prevent your network and data from being compromised.

Cisco strengthens security

Cisco Systems Inc. continued its recent security push with several new products designed to better-protect Cisco networks and an acquisition geared towards enhancing the company

Featured Security Download

Security Resource Kit

Security Training Resource Kit

Experts say that training can reduce security incidents by anywhere from 45% to 70%. "We asked ourselves why security training couldn't be fun as well as informative." IT World Canada and it's creative arm, Amazing! Agency have created some training materials which actually make security training engaging and interesting. Each unit starts with a fun video or interactive game and let's you get the interest of the group....

Privacy & Security Videos

Privacy & Security Blogs

7 steps to undertaking a Privacy Impact Assessment

PIA regulatory requirements and recommended frameworks may vary by jurisdiction, industry, and the type and sensitivity of data processed. Despite these differences, the following seven steps should be incorporated into any PIA program.

Slideshows

30 valuable hidden iPhone features [Part 1]

Using these ten hidden iPhone features will make your iPhone experience more productive and valuable.

10 free cybersecurity awareness training courses you can take today

A list of 10 organizations that are offering free cybersecurity awareness training courses to help you understand and report security threats and breaches.

Has your iPhone been hacked?

We've listed 13 ways hackers can compromise iPhones and highlighted ways to protect yourself and your data.

Tour Trend Micro’s new cyber security research lab in Toronto

  Cyber threats are becoming increasingly sophisticated, targeting everything from your inbox to elections, and Canada sees its fair share of them. Between 2011 and...