CANADA NEWS

Rogers victimized by ransomware

A misstep by an IT employee of Canadian communications conglomerate Rogers Communications allowed the contractual information of 50-70 of the company's business customers to be exposed via Twitter.

Anonymous member deported from Canada

Canada deported self-proclaimed Anonymous member Matt DeHart.

Canadian government investing to counter attacks

Shared Services Canada plans to spend $55 million to upgrade IT infrastructure.

CSE spies on global file uploads

One of Canada's intelligence agencies has been secretly monitoring file downloads across the world for years.

Canada losing cybersecurity war

Canada's companies are ill-prepared to meet modern cybersecurity challenges, according to a survey by the Ponemon Institute.

OPINIONS

Me and my job: Gina Chapman

Me and my job: Gina Chapman

Gina Chapman, senior director of security operations, Center for Internet Security

Attivo BOTsink

This is deception technology. It is, really, a high interaction honeypot on steroids. The system consists of two pieces: the BOTsink - a deception platform and IRES (Information Relay and Entrapment System) deception lures.

CRU SCILock

This product – with its objective of defeating persistent malware – is a fit for active breach detection.

Fidelis XPS

There really is little, if anything, that XPS cannot do in the digital forensics detection, analysis, prevention and response arena.

GuardiCore Data Center Security Suite

The GuardiCore suite exhibits characteristics of both active breach detection and threat deception plus a whole lot more.

illusive networks illusive

illusive is a very cool product that has as its main purpose focusing on the actors rather than the malware in an attack.

LightCyber Magna

LightCyber provides us with a behavioral attack detection tool.

Rapid7 UserInsight

Rapid7 has been in the vulnerability game for a long time and now have gotten into the active detection game.

TrapX DeceptionGrid

The whole focus of TrapX is based on operationalizing deception as a defensive activity.

Vectra Networks XSeries Platform

This is an active breach detection tool with a very particular focus: malware, most especially APTs.

Acuity Risk Management STREAM Integrated Risk Manager

starstarstarstarstar
STREAM is an integrated risk management tool delivered as a software product consisting of a database server, an application server and a client component.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US