Photo by Janko Ferlič on Unsplash You just have to outrun the other guy. Unfortunately, there is no absolute for security. There are sufficient unknowns and changes in the world of cybersecurity such as to make a state of ‘completely safe’ impossible. The greatest security in the world is still vulnerable under certain conditions, however unlikely …
A Privacy Enhanced Facial Recognition Access Control System Using Biometric Encryption Biometric authentication is seen as a mixed offering, the ease and comfort of a system that knows who you are without you having to work to prove it (as with a password) is balanced against the need to store personal information and the potential …
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness Burcu Bulgurcu and researchers from the Saunders School of Business at the University of British Colombia looked into the problem of employees not complying with security policy. Security policy is (generally) put in place to protect the company from attacks directed …
URL shortening services provide a short link in place of a long URL. Attackers sometimes use these services to mask the URL of a malicious destination, making it harder for a person to detect a link that they shouldn’t click on. A group from the university of Ottawa and IBM collected 300 thousand malicious …
The SANS institute have produced a white paper report on Security Awareness. This is an area of particular interest for me as the human element in security is something that I have been paying particular attention to. The work that we have been doing over the past years with cybersec101.ca to facilitate community-led security …
Are we all on the same page when it comes to IT Security ? How do our security practices align with the real-world risks? If you in a CISO, System/Network/IT administrator or similar role you can help us to find out together with a quick, anonymous survey online at: cybersecuritysurvey.org. It takes at most 15 …
Arnaque de l’enquêteur bancaire Le Centre antifraude du Canada produit des bulletins régulièrement pour aider les Canadiens à mieux se protéger contre la fraude. Que sont les courriels d’affaires compromis? Le courriel d’affaires compromis, aussi appelé fraude au président, fraude par virement bancaire ou arnaque des dirigeants d’entreprise, il s’agit d’une ruse complexe qui trompe une entreprise …
Dr. David Hofmann Presented at the 2018 Atlantic Security Conference In this presentation, Dr. Hofmann will discuss his recently completed funded research (TSAS / Public Safety Canada) into the three different types of social networks formed by lone-wolves during the 24 months prior to the commission of their first act of terrorist violence. Dr. Hofmann …
Today’s automobile contains a myriad of computers. While this advancement allows automobile to be more efficient and safer, that comes with new potentials risks. It is not clear if, by making car safer while using computers, automobile manufacturers thought about those computers becoming a threat if used maliciously. In this landmark research, Karl Kosher et …
Presented by David Fraser at The Atlantic Security Conference 2018. The new privacy breach notification law is coming into effect shortly and information security professionals are going to be on the front lines of breach investigation. David Fraser, recognized as one of the world’s top 30 data, privacy, cybersecurity lawyers, will provide a practical overview …