Building a More Private Cloud

The Cloud Security Alliance wants to see more privacy in the cloud The Cloud Alliance wants to raise the bar when protecting customer privacy in the cloud. That’s the message from its CEO Jim Reavis, The CSA will once again be hosting a free summit for attendees at the SecTor conference this year, addressing cloud […]

Read more

Building an Adaptive Security Culture

Become like water when learning how to fight off attackers. If you don’t adapt, you don’t survive. It’s just as true in business as it is in nature – and it’s particularly true in cybersecurity, where practitioners are constantly fighting off attacks from a constantly-evolving enemy. The answer to the problem is to build a […]

Read more

Should You Insure Yourself Against a Cyberattack?

The stakes are rising for Canadian and US firms alike. Cyber threats are on the rise, and companies do their best to protect against them. But it is also possible to insure yourself against the financial fallout, should the worst happen. Is it something you should consider? Cyber-insurance has taken off since the mid-2000s, as […]

Read more

Improve Your Cybersecurity With These IT Process Hacks

Before buying expensive cybersecurity tools, consider honing your IT operations. Another budget cycle, another upgrade. It’s time for a new firewall/SIEM tool/UTM appliance. Why? Because the new one has the latest next-generation fluid threat analysis technology/features a patented endpoint threatness system/comes in green. There are good reasons for an IT department to buy some of […]

Read more

US Surveillance Reform Only a Moderate Success for Privacy Advocates

Cybersecurity projects are just one way for the NSA to gather bulk data. This week was a big one for anyone concerned with privacy and cybersecurity in the US. After a great deal of wrangling, Congress finally passed the USA Freedom Act. It has been lauded as the most significant (if not only) successful Congressional […]

Read more

Five Cybersecurity Facepalms

In 2015, we’re still making the same mistakes. Plus a few new ones. Cybersecurity pros often suffer from a condition that we’ve come to call volarfaciem. This name comes from the volar, meaning the fleshy part of the hand in between the wrist and the fingers, and faciem, which is the latin for ‘face’. In […]

Read more

Peering into the Cybersecurity Crystal Ball

We revisit our predictions from SecTor 2014 to find out how they are unfolding. It has been over six months since the last SecTor security conference. At that event, there was a Predictions panel, in which five cybersecurity luminaries talked about key trends in the coming year. Half a year on, how are those predictions […]

Read more

The Four Secrets Of APTs

Advanced Persistent Threats (APTs) are in the news again, as security researchers track the Naikon APT, a sustained cyberattack on geopolitical targets in Asia. These persistent, sophisticated attacks keep CISOs awake the world over. After all, no one wants their organisation to be a headline in tomorrow’s paper. But do we really understand APTs? We […]

Read more

IBM’s Chief Information Security Officer Kris Lovejoy to open SecTor 2015, the 9th annual Security Education Conference Toronto

  TORONTO, ON, MAY 14, 2015 – SecTor, Canada’s premier conference on IT security, will kick off this October with a keynote presentation by Kris Lovejoy, IBM’s Chief Information Security Officer. Now entering its ninth year, SecTor brings together IT professionals and managers with security experts from around the world to share the latest research […]

Read more

When Data Breach Reports Collide

58 cents or $200 – how much does a lost record cost? Just how accurate can you be when estimating the cost of a lost record in a data breach? A spat between Verizon and data breach expert Larry Ponemon has thrown the question into sharp focus. This figure is important to CISOs. They have […]

Read more

Redefining Privacy in the Internet of Things

Should IoT devices tell you how they’re messing with your privacy? Or is privacy an illusion anyway? IBM has formed an entire business unit around it, Cisco says that there will be 50 billion devices connected to it, and governments are quietly grumbling about the privacy implications of it. Welcome to the Internet of Things. […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!
Fields marked with an * are required