Inside the Shadowserver crisis

Inside the Shadowserver Crisis

This week hasn’t been the best for the Shadowserver Foundation. The nonprofit is fighting for its life after its main US sponsor pulled the plug. How did we get here, what does this mean for the internet, and what’s next? Shadowserver began in 2004 as a purely voluntary initiative started by Nicholas Albright. Furious to […]

Read more

SecTor 2020 and COVID-19

The situation surrounding COVID-19 continues to develop quickly. In the 24 hours preceding this post we’ve seen travel from the United States to mainland Europe discontinued. Schools in the Toronto area are not returning until at least April 5 and large gatherings are either being discouraged or disallowed depending on the region. We remain optimistic […]

Read more
What exposed docker registries tell us about cloud deployments

What Exposed Docker Registries Tell Us About Cloud Deployments

If you’ve delved into cloud technologies at all, you’ve probably run across the concept of containers. They promise to streamline your software developments, but they come with their own dark lining. This week, Palo Alto Networks’ Unit 42 research team published some shocking security research about container registries that should give us pause about how […]

Read more
a trying time for US election security

A Trying Time for US Election Cybersecurity

With less than a year to go until America chooses its next president, its election security needs some work. Last week, Mick Baccio, the CISO for democratic candidate Pete Buttigieg, quit the campaign. He cited “a fundamental philosophical difference with campaign management regarding the architecture and scope of the information security program.” This leaves democrats […]

Read more
Passing a standard for bug reporting

Security.txt: A Standard Signpost For Ethical Hackers

A proposal that makes it easier to submit bug reports is close to getting the final stamp of approval – but even when it does, there’s still a lot of work to do. Edwin Foudil first submitted security.txt as an Internet Draft to the Internet Engineering Task Force in September 2017. It’s a format for […]

Read more

Contest Solution Revealed

At SecTor 2019 we ran another exciting Capture the Flag (CTF) contest with something for everyone, from novices to experts alike. With a special thanks to Dolos Group for setting up and running the CTF, and Nuix for their support, it was one of the best we’ve seen to date. Congratulations to all who participated, […]

Read more

SecTor 2020 Plans Begin!

When we founded SecTor, we did it because we were regular attendees of Black Hat, Defcon and several other US based events and we were frustrated that Canada had nothing of the sort. We started SecTor both to bring the best and most important security researchers from around the world to Canada, and to showcase […]

Read more

How To Get The Most From Your First Cybersecurity Conference

When it comes to cybersecurity conferences, DEF CON is one of the most daunting. It’s huge, busy, and filled with experts, many of whom already know each other. So when Laylee Olsen ventured there for the first time, she was understandably a little nervous. It was the first ever cybersecurity conference for 30-year-old Olsen, a […]

Read more
What Data Breaches and Climate Change Have in Common

What Data Breaches and Climate Change Have in Common

If you feel powerless to protect your data—and other peoples’—against an onslaught of cyberattacks, you’re not alone. In March, Cisco’s 2019 CISO Benchmark Study surveyed 3,259 IT security pros around the world. It found that 30% of them suffered from cyber fatigue, a condition which it describes as “having virtually given up trying to stay […]

Read more
Shoul You Pay An Online Ransom?

Should You Pay An Online Ransom?

If you weren’t convinced that data is one of your most valuable assets, just look at how often criminals are locking it up and holding it to ransom. Ransomware attacks have become an epidemic, hitting targets ranging from schools to government offices, and even hospitals. Ransomware attacks are especially endemic among governments. Recently, 22 government […]

Read more
Why Cloud Data Keeps Getting Exposed

Why Cloud Data Exposures Keep Happening

Finding online data exposures is like shooting fish in a barrel—assuming that you’re using an M65 cannon with a nuclear payload. New and horrific breaches emerge every week. In the last couple of weeks alone, we’ve seen several, each violating privacy and security in different ways. Some expose internal information that could be useful to […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!
Fields marked with an * are required