Magnifying glass on keyboard

How to track down the infrastructure supporting malware distribution

A good CISO always looks for ways to increase the skills of staff – in fact, it’s a necessity given...

August 17th, 2017 Howard Solomon

How to make digital risk management part of a threat intelligence program

IT risk management is an essential element of the work of CIOs/CISOs. As the SANS Institute describes it, risk is...

August 2nd, 2017 Howard Solomon

Palo Alto Networks - Ignite

Palo Alto Networks goes cloud platform route, backed by $20 million venture fund

Palo Alto Networks is the latest enterprise IT vendor to pitch itself as a developer platform, with the launch of...

June 13th, 2017 Brian Jackson

security and privacy issues

How to turn threat information into threat intelligence

Infosec teams face a deluge of data every day from an array of network and application sensors as well as...

April 17th, 2017 Howard Solomon

Threat sharing efforts still fall short, says McAfee

With cyber attackers finding a multitude of ways of evading defences, threat intelligence sharing is taking on increasing importance. Whether...

April 7th, 2017 Howard Solomon

Go Beyond Next-Gen: Trend Micro protects the enterprise with XGen™, a New Class of Endpoint Security

Go Beyond Next-Gen: Trend Micro protects the enterprise with XGen™, a New Class of Endpoint Security

As the ever-changing security landscape is struggling to keep up with the latest threats, and especially with the rise of...

Sponsored By: Trend Micro

Canadian Cyber Threat Exchange ready to start membership push

After months of planning the country’s first national IT threat service has issued its first threat report to a few...

December 8th, 2016 Howard Solomon

Gloves IT teams fight back

Pros and cons of creating a threat intelligence team

We’ve written several pieces on the importance of threat intelligence these days to an organization. Being on top of threats...

November 22nd, 2016 Howard Solomon

2016 Cisco Annual Security Report

2016 Cisco Annual Security Report

Online criminals are quickly gaining access to organization’s data and holding private information hostage. Integrated threat defense technologies can often...

November 7th, 2016 IT World Canada Team