Why We Must Fight Breach Fatigue

Why We Must Fight Breach Fatigue

Each year, the guardians of the English language over at Merriam-Webster must accommodate new words in a changing world. We revel at the thought of conservative editors sitting in a dusty office, wincing as they write up the definitions for ‘humblebrag’, ‘woo-woo’, ‘binge-watch’ and ‘photobomb’. In 2018, we think it’s time they added another: ‘breach […]

Read more
This New Tech Could Keep Defenders Ahead in the Cybersecurity Wars

How New Tech Could Keep Defenders Ahead in the Cybersecurity Wars

The cybersecurity industry is on fire. As attackers innovate, defenders are relying on new technologies to given them an advantage. What technologies are most promising in the battle to protect our networks and data? SecTor asked several of its experts. People were most fired up about artificial intelligence and its subset, machine learning. Machine learning […]

Read more
What the cybersecurity community could do better in 2018

How the Cybersecurity Community Could Improve in 2018

2018 is here, and it’s time to take stock and look for areas of self-improvement. That goes not just for companies looking at their own security, but also for vendors tackling the cybersecurity market in 2018. SecTor asked its team of experts what single thing they thought the cybersecurity industry could be doing better in […]

Read more
What Cybersecurity Experts Hope For In 2018

What Cybersecurity Experts Hope For In 2018

2017 has been a roller coaster year. Data breaches continued to get larger and more severe. Equifax dropped the personal details of up to 145m people, while leaving millions of citizens’ personal data unencrypted on cloud storage became a trend. Things couldn’t get much worse from a security standpoint, but the new year is a […]

Read more
The Internet's Biggest Threat Is Under The Sea

The Internet’s Biggest Threat Lies Under the Sea

Something murky is going on again under the sea. In the UK, defence staff chief Sir Stuart Peach has warned that Russia has been operating ships near the undersea cables that digitally connect the US, Europe, and others. He worries that Russians cutting those cables represent “a new risk to our prosperity and way of […]

Read more
Black Friday Cybersecurity

Cybersecurity Report Card Says Retailers Must Try Harder

‘Tis the season for retailers, who face their busiest time of the year in terms of online and offline sales. This week’s US Thanksgiving shopping spree kicks off a bumper season that takes in Black Friday, Cyber Monday, Green Monday (December 11) and Free Shipping Day (Dec 15), not to mention the Christmas panic buying […]

Read more
Building botnets with the blockchain

Building Botnets on the Blockchain

Whenever a new technology comes along, it isn’t long before someone works out how to use it for nefarious purposes. The latest is the blockchain underpinning Ethereum, which is a next-generation network for running decentralized applications. At SecTor this week, security researcher Majid Malaika reveals how to use one of Ethereum’s most innovative features to […]

Read more
Winning Defense

What Winning Looks Like In Cybersecurity

Allison Miller didn’t start as a cybersecurity expert. The product manager for privacy and security at Google originally studied business and economics, before working in ecommerce and finance. When she takes the stage to keynote at SecTor 2017 this month, she’ll be drawing on her expertise in those fields to talk about how cybersecurity can […]

Read more
Beware Fake SecTor Scammers

PSA: Beware Fake SecTor Scams

One of the unfortunate side effects of building a successful conference is that it draws the scammers out of the woodwork. If someone contacts you and you can’t validate what they tell you by referring to the secured SecTor website at https://sector.ca/ then contact us to confirm the information. Our call out teams will only […]

Read more
Compromising Industrial Robots

Sabotage and Subterfuge: Hacking Industrial Robots

Isaac Asimov’s three laws of robotics are safe, sensible rules. First laid out in 1942, rule number one prevents a robot from harming a human being. The second forces it to obey orders given it by people, except where such orders would conflict with the first law. Finally, it must protect its own existence as […]

Read more
Where have all the grey hack BBSs gone?

Charting Hacker Hangouts From BBS To Slack

Where have all the grey hat hacker forums gone? Grey hats were always a valuable part of the hacker community. They may sometimes cross ethical lines, but unlike black hats they’re in it to learn, not to make money. A black hat might intend to steal credit cards and resell them online. A grey hat […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!
Fields marked with an * are required