A threat detection system that aims to be collaborative and active cannot function without adequate communication between the actors involved. In particular, an exchange of information about responses to security incidents allows better identification and prevention of future incidents while enabling them to be isolated faster. On the other hand, the main problem that seems …
Presented by Duc-Phong Le as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity. About the presentation Data privacy has recently become a hot topic in the news thanks to failures in security and concerns about how companies are using the personal data they collect about their customers …
Presented by Dane Vanderkoi as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity About the presentation Recent years have seen the rise of a new group of technologies known as IoT (Internet of Things). IoT devices seamlessly connect and share information, providing additional functionality and convenience for …
Presented by Yuan Stevens as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity. About the presentation In 2018, the Government of Canada released its Strategy to Prevent and Address Gender-Based Violence. An annual review of the strategy demonstrates that the Canadian government is slowly beginning to regulate …
Presented by Ryan Kennedy as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity About the presentation Advances in data collection abilities, the rapid diffusion of smartphones, and recent large scale data breaches are causing consumers’ location privacy awareness and concerns to rise. Privacy related literature contains several …
Social networks on mobile applications are used more and more by everyone. Businesses and individuals use platforms like Twitter, Facebook, Instagram, WhatsApp, YouTube, and many others as sources of entertainment and income. However, the increase in use and public engagement on those platforms has also caused a significant increase in user privacy risks. Computers and …
Les réseaux sociaux sur application mobile sont de plus en plus utilisés par tous. Autant pour les entreprises que pour les individus, ces plateformes, comme Twitter, Facebook, Instagram, WhatsApp, YouTube et plusieurs autres sont sources de divertissements et même de revenus. Cependant, l’augmentation de l’utilisation et de l’engagement de la population sur ces plateformes ont …
We all have questions, but who are the people with the answers for Cybersecurity. In this series we sat down with academics and experts to ask them about how they got started, what they are researching now, their lessons for us and the future. In this last episode of our series with Stephanie Perrin, we …
We all have questions, but who are the people with the answers for Cybersecurity. In this series we sat down with academics and experts to ask them about how they got started, what they are researching now, their lessons for us and the future. In this second episode of our series with Stephanie Perrin share …
La protection des informations personnelles est un sujet d’actualité de plus en plus discuté. De nombreux cas de vols ou d’utilisation malveillante des données personnelles ont fait les manchettes et la population devient plus craintive à cet égard. Mais qu’en est-il des cas où les individus offrent eux-mêmes ces informations de manière inconsciente sans se …