How Deep Is Your AI and Deep Learning In Your IT Security Stack
Barrier1 was formed out of experience and frustration. The group of developers of Barrier1 and the lead were part of the cyber team for...
ESET Researchers Discover First UEFI Rootkit Used In Cyberattack
The research team based in Montreal, discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims’ computers, the first-ever in-the-wild. Dubbed...
How secure is your phone’s lock screen?
ESET shares tips for keeping your personal device secure.
As people become more sensitive about the privacy and security of their data, Canadians across the...
Why Employee Cyber Security Awareness Training? – Channel Survey Report
Most cyber security breaches (research shows as much as 91%) are happening because of human error. Humans are just prone to making mistakes.
It’s common...
WatchGuard Reports 91.5% of Malware Arrived over Encrypted Connections in Q2 2021
WatchGuard Technologies released its latest quarterly Internet Security Report, detailing the top malware trends and network security threats analyzed by WatchGuard Threat Lab researchers...
WithSecure Introduces New Incident Response Services
The first 72 hours of an attack are a crucial window for incident response teams. To support organizations in preparing a swift, efficient response...
StorPool Introduces New Disaster Recovery Solution
StorPool recently announced they’ve added a Disaster Recovery engine into the StorPool Storage Platform that will empower managed storage providers and enterprises to recover virtual...
ZeroFox: What’s Out There Can Hurt your Cyber Game!
Interview with Jason Sumpter, Senior Director of Product Management, and Joel Vinocur, Director of Channel – Americas, of ZeroFox
Organizations are tasked with managing a never-ending list...
Trend Micro Releases Study Results on Cloud Security
Canada recently introduced Bill C-26, a new legislation to strengthen cybersecurity across financial, telecommunications, energy, and transportation sectors. If passed, the legislation would compel...
Ethical hacker gets stumped by Barrier 1 technology
Ethical hackers – sometimes called White Hats – work the same way as their Black Hat counterparts except when they exploit computer system vulnerabilities...














