Finding Flaws in IoT Devices

That Internet-connected Barbie that listens to your kid is hackable. Your ex could stalk you in your car even if it wasn’t designed to be a connected vehicle, and someone could alter your medical dose remotely while you’re in hospital. No wonder the NSA is both excited by IoT and worried about it, in equal measure. […]

Read more
How Machines Will Classify Malware

How Machines Will Classify Our Malware

John Seymour believes that machines can do a better job of classifying an ocean of malware – if we can just teach them properly. Seymour, a data scientist at social media threat intelligence firm ZeroFOX, wants to turn computers into sorting tools that can help antivirus researchers. He has devoted his PHD studies to the […]

Read more
Ben Sapiro

This Man Is About To Make Your Job Easier

Calling all security pros and IT managers bogged down by compliance and governance paperwork: Toronto-based cybersecurity expert Ben Sapiro wants to make your job easier. And this year at SecTor 2016, he’ll unveil a tool that will help. Sapiro, a long-time SecTor speaker, first appeared in 2007 with a data-driven talk describing how threats were evolving. […]

Read more
Can artificial intelligence save your data

Can Artificial Intelligence Save Your Data?

It is sixty years since scientists gathered for their historical meeting about artificial intelligence at Dartmouth College in New Hampshire. It was a month-long brainstorming session during which scientists they explored the possibilities of thinking computers, and it kick-started a field of research that we’re still benefiting from today. AI is revolutionizing areas ranging from […]

Read more
Chris Vickery

Chris Vickery: Finding the Crown Jewels Online

For a person who just found the personal details for most of the adult Mexican population sitting in a publicly accessible database, Chris Vickery is remarkably self-effacing. His security research is mostly part-time, he’s entirely self-taught, and his days are spent wrangling the IT at a local law firm. He downplays his out-of-hours security work, […]

Read more
Mikko Hypponen

Back to the Future with Mikko Hypponen

In a few decades, your computers may be mostly bug-free because programmers won’t be writing your code, according to Mikko Hyponnen. The chief research officer for F-Secure always has something controversial to say, which is why Black Arts Illuminated has bought him back as a keynote for SecTor 2016, which marks the security conference’s tenth year. Today, […]

Read more

A Decade of Data Breaches

It’s been ten years since SecTor first began. The conference launched as a no-nonsense, fact-filled event designed to help security professionals protect themselves against attack. The organizers created it because Canada needed it back then, and we clearly still need it now. The last ten years have been filled with hacks, and the number of stolen records […]

Read more

Can Mathematics Prove That Your Network Is Secure?

Mathematical algorithms might be able to predict exactly how your network will act. Is it possible to prove, beyond all shadow of a doubt, that your network is secure? SecTor has talked about how security alerts are becoming more probabilistic. This week, we’re looking at an effort to do the opposite, by turning probabilistic estimates of security […]

Read more

Finding a Needle in the Cybersecurity Haystack

Everyone is curious about your IT systems. They are being probed, prodded and profiled by people on the Internet all the time, which creates lots of traffic. Many of these events metastasize into incidents that may generate concern, and cause an alert. There can be hundreds or thousands of them each day, and your team’s […]

Read more

Tackling Open Source’s Security Problem

The US government wants to improve the quality of open source software by making it easier to find vulnerabilities in it. The Department of Homeland Security hopes that better code reviews and bug bounties will help to reduce the security flaws in these projects, which are used extensively on the Internet by companies large and […]

Read more

Why Heed Security Warnings When They Mean Nothing?

The world is full of foolish users who click on things without knowing better, but it is also filled with badly-designed products that don’t do a good enough job of warning them about the dangers they’re facing. How do we fix it? Studies over the years have told us what we instinctively knew – that […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!
Fields marked with an * are required