a trying time for US election security

A Trying Time for US Election Cybersecurity

With less than a year to go until America chooses its next president, its election security needs some work. Last week, Mick Baccio, the CISO for democratic candidate Pete Buttigieg, quit the campaign. He cited “a fundamental philosophical difference with campaign management regarding the architecture and scope of the information security program.” This leaves democrats […]

Read more
Passing a standard for bug reporting

Security.txt: A Standard Signpost For Ethical Hackers

A proposal that makes it easier to submit bug reports is close to getting the final stamp of approval – but even when it does, there’s still a lot of work to do. Edwin Foudil first submitted security.txt as an Internet Draft to the Internet Engineering Task Force in September 2017. It’s a format for […]

Read more

Contest Solution Revealed

At SecTor 2019 we ran another exciting Capture the Flag (CTF) contest with something for everyone, from novices to experts alike. With a special thanks to Dolos Group for setting up and running the CTF, and Nuix for their support, it was one of the best we’ve seen to date. Congratulations to all who participated, […]

Read more

SecTor 2020 Plans Begin!

When we founded SecTor, we did it because we were regular attendees of Black Hat, Defcon and several other US based events and we were frustrated that Canada had nothing of the sort. We started SecTor both to bring the best and most important security researchers from around the world to Canada, and to showcase […]

Read more

How To Get The Most From Your First Cybersecurity Conference

When it comes to cybersecurity conferences, DEF CON is one of the most daunting. It’s huge, busy, and filled with experts, many of whom already know each other. So when Laylee Olsen ventured there for the first time, she was understandably a little nervous. It was the first ever cybersecurity conference for 30-year-old Olsen, a […]

Read more
What Data Breaches and Climate Change Have in Common

What Data Breaches and Climate Change Have in Common

If you feel powerless to protect your data—and other peoples’—against an onslaught of cyberattacks, you’re not alone. In March, Cisco’s 2019 CISO Benchmark Study surveyed 3,259 IT security pros around the world. It found that 30% of them suffered from cyber fatigue, a condition which it describes as “having virtually given up trying to stay […]

Read more
Shoul You Pay An Online Ransom?

Should You Pay An Online Ransom?

If you weren’t convinced that data is one of your most valuable assets, just look at how often criminals are locking it up and holding it to ransom. Ransomware attacks have become an epidemic, hitting targets ranging from schools to government offices, and even hospitals. Ransomware attacks are especially endemic among governments. Recently, 22 government […]

Read more
Why Cloud Data Keeps Getting Exposed

Why Cloud Data Exposures Keep Happening

Finding online data exposures is like shooting fish in a barrel—assuming that you’re using an M65 cannon with a nuclear payload. New and horrific breaches emerge every week. In the last couple of weeks alone, we’ve seen several, each violating privacy and security in different ways. Some expose internal information that could be useful to […]

Read more

What Online Application Flaws Should You Be Worried About?

What application vulnerabilities should you be worried about when protecting your organization? Well, all of them, of course, but some more than others. Bug bounty company HackerOne recently analyzed the 120,000 vulnerabilities that researchers have reported through its platform to highlight the most common and highest-earning flaws. HackerOne organizes community bug-finding programs for top brands […]

Read more
Help the Security Effort By Becoming an IoT Researcher

Help the Security Effort By Becoming an IoT Researcher

For UK users concerned about their connected devices leaking personal data, help may be on the way. Fed up with the Internet of things (IoT) industry’s failure to self regulate, the UK government is preparing to govern the privacy and security consumer of devices itself. It just released a consultation document that lays out a […]

Read more
Here's How We Know Exactly What Alexa Is Hearing

Here’s How We Know Exactly What Alexa Is Hearing

When you talk to Amazon’s Alexa, it isn’t only a cloud-based digital assistant that listens. This week, Bloomberg reported that humans are listening in on your Alexa recordings to better train the system. These workers include not just full-time Amazon employees, but international contractors. They even have online chat rooms where they replay the recordings […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!
Fields marked with an * are required