IT Futures Registration is Live

Get in on the ground floor Today is a big day for Black Arts Illuminated, SecTor’s parent company. Early bird registration for its new conference, IT Futures, opens today, in co-ordination with a brand new web site.IT Futures will give technology experts and businesspeople alike a unique view into emerging technologies, explaining how they will […]

Read more

Are You Spending Enough On IT Security?

Most Canadian firms aren’t, according to industry figures. How much should your organization be spending on security? According to analyst figures, about 14% of the IT budget – but less than a quarter of companies are spending that much.Last year, IDC released a report analyzing Canadian companies’ security budgets to find out how much they […]

Read more

Moving Beyond The Password

Passwords aren’t secure. So what’s the alternative? Google is testing its own anti-password login mechanism using mobile phones as two-factor authentication (2FA) devices, following hard on the heels of Yahoo, whichlaunched a password-free login system for its users in October.Companies like these are offering new authentication mechanisms because passwords are a terrible way to authorize […]

Read more

When Insider Threats Come From The Outside

Not all insiders work at a desk in your company. Insider threats don’t always come from your office. Are you prepared to manage those that don’t?We all understand the classic insider threat: a malicious employee, perhaps disgruntled at being passed over for a promotion, may steal valuable data to sell on the open market or […]

Read more

Making Malware That Sticks

How do malware writers create and test their malicious code? They lurk all over the world, from basements to offices, trying to take down your machines from afar. Malware writers have produced some devious code, eluding anti-virus tools to get their programs on your machine. From there, they will send spam, serve up their illegal […]

Read more

IoT Security: It’s Coming To The Office – Are You Prepared

Consumer IoT devices are coming to your company, whether you want them or not. When it comes to technology, what finds its way into the home will eventually worm its way into the office.  We saw it with social media, mobile devices, and cloud file sharing services, all of which the IT department now has […]

Read more

IoT Security: Navigating The IoT’s Data Ocean

Ann Cavoukian has a plan to shore up privacy in a ubiquitously connected world Ann Cavoukian is interested in your privacy, especially in a world where everything is connected to everything else. If you thought you were living in a technology landscape filled with data and analytics, you haven’t seen anything yet, she warned. As […]

Read more

IoT Security: Assessing the Hidden Risks

IoT Security: Assessing the Hidden Risks Imagine a scifi novel, set 50 years into the future. In it, someone is confronted by a forest of Internet-connected devices. Dusty, with faded colours and logos that no one remembers, they continue humming away, their blinking lights dim but still active. And no one knows what they do. […]

Read more

IoT Security: Can You Trust Your Fridge?

Tripwire’s IoT Hack Lab team warn about IoT botnets and homes that might be too smart for their own good. What’s the only real way to render an Internet of Things device safe? Unplug it, says Craig Young. He is a security expert at Tripwire, which ran its first IoT Hack Lab at the SecTor […]

Read more

Cyberthreats: Kevin McNamee on the Evolving Dangers From Mobile Malware

How your phone is becoming the next battleground for attackers The war against malware will increasingly be fought via mobile platforms in the next few years. So says Kevin McNamee, director of motive security at Alcatel-Lucent. McNamee spoke at the SecTor 2015 conference, presenting his view of emerging mobile malware threats. It’s no wonder that […]

Read more

Cyberthreats: Joe Pizzo on the Shadowy Corners of the Darknet

Norse Corp expert explains how darknet sites are being used to sell exploits and exploited machines The Internet is a kind of inverted iceberg. At the top is the visible part – a huge, ever-changing mass of information. But lurking under the surface is a whole other Internet, probably far smaller, and drastically different. This […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!
Fields marked with an * are required