It’s Nearly Time!

Are you fully prepared for SecTor 2015? Here are some last minute things to look out for. We’re down to the wire. It’s the last weekend before one of the most important Canadian security events of the year. Next week sees the official opening of SecTor’s ninth security conference, and co-organiser Bruce Cowper has a […]

Read more

Are Beneficial Botnets a Good Idea?

SecTor interviews The White Team vigilante group Hundreds of thousands of routers around the world have been infected by a botnet. Instead of bitcoin mining or redirecting DNS queries to malicious sites, though, it has good intentions. The Wifatch ‘malware’ cleans house, locking down router insecurities and deleting known malware. It’s a benevolent botnet. What […]

Read more

Mixing Water and Oil

How attitudes to cybersecurity vary between countries Will emerging economies ever see eye to eye with developed countries on cybersecurity? The Chinese president, Xi Jinping, seems to hope so. He recently visited the White House to talk cyber-co operation. The upshot was a tentative understanding that the countries would end state-sponsored cyberattacks (without ever admitting, […]

Read more

Can Privacy and Big Data Coexist?

You’d better hope so. Ann Cavoukian knows a thing or two about privacy. For 17 years, she served as Ontario’s provincial Information and Privacy Commissioner and was outspoken on a variety of topics, ranging from government surveillance powers to online ad tracking.  Now, as executive director of the Privacy and Big Data Institute at Ryerson […]

Read more

All That Glitters is Not Gold

Proper cybersecurity measures take insight and forethought. All that glitters is not gold. Sometimes, shiny new security products can make matters worse, rather than better. That’s the premise of a recent article by SecTor co-founder and organizer Bruce Cowper, published over at Dark Reading. The article, Avoiding ‘Magpie Syndrome’ In Cybersecurity, suggests that vendors and […]

Read more

A Look Inside the US Secret Service

How the US DHS tracks down international cybercriminals When Jason Brown takes the stage for his keynote address at SecTor next month, there won’t be any cameras or recording devices in the room. He won’t allow it because of what he’s going to say. This Secret Service agent is privy to some of the most […]

Read more

A Day in the Life of a Penetration Tester

What happens when clients pay you to hack them When Adrien de Beaupré is having a good day at work, you’ll often find him giggling. The independent senior information security consultant specializes in penetration testing for corporate and government clients, while also teaching penetration testing at the SANS Institute. de Beaupré, who will talk about […]

Read more

How Microsoft Watches What Attackers Do

The best form of defence is common sense, says Tim Rains Attackers are working faster, but not necessarily much smarter, Microsoft security guru Tim Rains will reveal at SecTor next month. The chief security advisor for the company’s worldwide cybersecurity and data protection group, has worked closely with Microsoft researchers to find out how exploits […]

Read more

Whodunnit? Why Cyberattack Attribution Is So Tricky

“Was it North Korea, in the drawing room, with the poker?” When a hacking scandal engulfs a company or government, it typically brings two things: newspaper headlines shaming the victim for their incompetence, and public debate about who actually did it. The OPM breach is a good example. Katherine Archuleta resigned after being blasted by […]

Read more

Who Should You Share Your Cybersecurity Data With?

Sharing is caring, but it’s also a tricky business. Last week, Facebook announced that over 90 companies are sharing cybersecurity information with each other through its systems. They’re collaborating via ThreatExchange, the API-accessible community that it launched for that purpose back in February. US government agencies are specifically not invited, though. This shows just how […]

Read more

How To Measure Your Cybersecurity

Jessica Ireland will teach you how to gauge your security capability. “If you cannot measure it, you cannot improve it”. That was the view of Lord Kelvin, who discovered the theory of absolute zero, and came up with the Kelvin scale. But can you measure your organisation’s performance at cybersecurity? And what would that look […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!
Fields marked with an * are required