Blog - Partners

Blog

The Human Element: How to Protect Your Greatest Asset and Your Greatest Risk on Social Media

Kicking off National Cyber Security Awareness Month, we thought today’s Fox Friday would be a great opportunity to discuss protecting your greatest asset and greatest risk on social media with partner, ZeroFox. Experts agree: the greatest cybersecurity risk modern businesses ... »

Why avoiding social media might make your business less safe

Social media has rapidly become a standard for digital communications and business connectivity, providing organizations with unprecedented ability to build brand, engage customers and expand their reach. Despite recent negative headlines, social networks usage for businesses and their employees alike ... »

Top Cyber Trends in Healthcare Today

The healthcare sector received more than half of all cyberattacks in 2017. The cybersecurity professionals at Fortinet, sat down with National Healthcare Practice Director at Fortinet, Sonia Arista to get her professional perspective on the key cybersecurity trends impacting the healthcare space today. What would ... »

How UEBA Can Save Your Organization From Internal Threats

A recent 2017 study shows that 69% of organizations were impacted by a form of internal data theft. UEBA can help. Everyone has heard about external threats, whether this be ransomware like WannaCry, crypto jacking or phishing. Yet, no one ... »

FortiOS 6.0 Transforms Security to Enable Digital Transformation: 5 Highlights from Our Camp Secure Sense Presentation

We recently had an opportunity to deliver a presentation on FortiOS 6.0 at the Camp Secure Sense customer and partner conference in southern Ontario, Canada. With some of the most well-known organizations under the Maple Leaf Flag in attendance, the ... »

The Difference between a Computer Virus and Computer Worm

Computer Viruses and worms are often used interchangeably: there are a few key differences in how they work. Both viruses and worms are a type of malware: a worm is a type of virus. What is a Computer Virus? Computer viruses are named after ... »

Mimecast acquires Cybersecurity training company Ataata

Currently, about 95% of data breaches stem from human error. Ataata aims to change this. Secure Sense partner, Mimecast describes Ataata as a “security awareness training and cyber risk management platform that helps you combat information security breaches caused by ... »

Camp Secure Sense Recap

The Camp Secure Sense recap you’ve all been waiting for. Camp may have ended in June, but the memory will live on! We hope that everyone had a fantastic time and we are extremely thankful that over a 100 of ... »

Phishing Intelligence Engine (PIE): Open-Source Release

By Greg Foss We are pleased to announce the release of the LogRhythm Phishing Intelligence Engine (PIE), an integrated application with LogRhythm’s Threat Lifecycle Management (TLM) platform. What is Phishing Intelligence Engine (PIE)? LogRhythm’s PIE can help streamline and automate ... »

What Everyone Must Know About Camp Secure Sense

In a few days over 100 cybersecurity professionals from around Canada will be together for the 4th annual Camp Secure Sense. Camp Secure Sense is our 2-day, 1-night security conference. Supported by our best-of-breed security partners, Camp offers guests’ today’s ... »

Journey to the AI-Enabled SOC: Advancing the Science of Threat Detection

Artificial Intelligence (AI)-enabled analytics offer great promise for furthering the science of advanced threat detection. While it is difficult to imagine AI superseding the cognitive and instinctive power of talented security analysts and threat hunters in the immediate future, AI ... »

The Digital Transformation of Enterprise

The Internet of Things is emerging as one of the most significant technology developments of our time. Connecting people and things will be the new norm for consumers, but behind the scenes, IoT is already transforming how enterprises develop, market, ... »

How to build a social media protection program: a 10-step guide

Building a social media protection program is a must-have in the modern age. Business are increasingly exposed to risks — cyber, brand and physical — on social media and digital channels, all of which exists unregulated and outside of the ... »

The 9 Most Vital Network Security Best Practices

An old truism suggests that an ounce of prevention is worth a pound of cure. While this saying is relevant in most aspects of daily life, it becomes especially appropriate when applied to business network security. Data Dangers Thanks to ... »

Fortinet Acquires Bradford Networks

On June 4th, Fortinet announced they were acquiring Bradford Networks. Strengthening the Fortinet Security Fabric and extend segmentation and security to the edge of the enterprise network including Internet of Things (IoT). This purchase comes during a time of increased ... »

What is Cyber Resilience and Why Should I Care?

I’ll be the first to admit it – there’s a lot of acronyms, buzzwords, and catchphrases in the cybersecurity industry today and it can be difficult to understand how a product reflects the core values that give these words life. ... »

Bugcrowd Programs at a Glance

We at Bugcrowd, believe crowdsourced security space is evolving rapidly. At Bugcrowd, we have more first-time Program Owners than ever trying out crowdsourced security economics through our Vulnerability Disclosure Programs and hundreds who have transitioned to on-demand and ongoing Bug ... »

Embracing Security Intent and IBNS

What is IBNS, and what are its advantages?  Intent-based network security (hereafter “IBNS”) helps with several areas that are of top concern for enterprise security leaders: Software-defined networking New application deployment Moving applications across platforms (e.g. on-prem, cloud, virtual, containers) ... »

How to Close IoT Security Gaps

Protecting IoT devices is currently one of the biggest challenges in network security. These devices are also one of the most common reasons organizations fail network security audits. IoT security challenges are growing at a staggering pace, with Gartner predicting ... »

Why IT leaders attend Camp Secure Sense

In 35 days, the doors open to Camp Secure Sense 2018. With over 100 IT professionals from various industries attending it’s an event that no cyber professional should miss. Because Camp Secure Sense is a ‘no product pitch zone’ and ... »

Is Your Biggest Security Threat Already Inside Your Organization?

The person in the cubicle next to you could be your company’s biggest security threat. The large-scale attacks we’re accustomed to seeing in the news — Yahoo, Equifax, WannaCry ransomware — are massive data breaches caused by cyber criminals, state-sponsored ... »

6 Things to Watch Out for in Phishing Attacks

While phishing attacks may be one of the oldest forms of attacks, they have shown no signs of slowing down. The growth of phishing attacks in both frequency and sophistication poses a significant threat to organizations of all size. It’s ... »

Why Cyber Security is the New Health and Safety

Many people view the Health and Safety at Work Act 1974 as unnecessary and burdensome, but its introduction has had a dramatic impact on reducing accidents in the workplace, particularly within industrial settings. This blog was originally posted by our ... »

Solving the Industrial IoT Challenge: How Manufacturing Companies Can Keep Devices Secure

Whether manufacturing organizations are retrofitting IoT devices into existing manufacturing equipment or buying new equipment that already includes IoT devices and sensors, it is clear that IoT devices are poised to dramatically improve manufacturing efficiency. The “IoT in manufacturing” market ... »

Why SMBs Are Easy Targets for the Bad Guys

As malicious hackers turn up the heat, small and medium businesses can’t remain complacent – the threats to their security are real and growing worse all the time. This blog was originally posted by Symantec.  During a recent business dinner, ... »

What is Camp Secure Sense?

At Secure Sense, we do things under our own banner. And it’s no exception when it comes to Camp. But what is Camp you ask? Well, Camp Secure Sense is our take on the traditional ‘steak lunch,’ without being, a ... »

Olympic Destroyer, the malicious file-wiping malware hits Pyeongchang

Security experts say they have identified a destructive malware dubbed “Olympic Destroyer” that was likely used in a cyber attack on the Pyeongchang Winter Olympics during the opening ceremony last week. Winter Olympics officials confirmed on Sunday that a cyber ... »

Why Ethics Matter in Bug Bounties

The bitter truth is, everyone in the world (including you!) is susceptible to cybercriminals. And to no surprise, a security breach has the capacity to debilitate any organization’s reputation. But is it the actual breach or is it how the ... »

2018 Cybersecurity Predictions

Looking back, 2017 had all the twists and turns of a good disaster movie. Hackers steal and leak the NSA’s powerful exploit kit that’s then unleashed on the world through a Dr. Evilish ransomware-worm hybrid.  Later, a top U.S. credit reporting agency ... »

2017 Holiday Party

Better late than never right? All of us from Secure Sense just want to extend a sincere thank you to all those that attended our first (and very memorable) Holiday Party. The evening was complete with lots of food, drinks, ... »

Email Fraud Continues To Expand its Footprint in Q3 2017

Email fraud, or business email compromise, is a growing threat that impacts organizations of all shapes and sizes. These highly targeted email attacks that spoof trusted executives or partners, often don’t include a payload – such as a malicious URL ... »

Online shopping security tips to keep your data safe this Black Friday

The Christmas ads have started, the streaming services are trying to subtly push us into listening to festive music, and the American Thanksgiving is has arrived. Thanks to our partner, Symantec, we have a Black Friday shopping guide to help ... »

Phishing Testing: Building Your Human Firewall

Phishing is becoming a major threat vector for organizations all around the world. Phishing is the exercise of sending illegitimate emails designed to elicit a response from the end user, whether that’s clicking on a link that infects them with ... »

Understanding GDPR & What it Means for Cyber Security

On May 25, 2018, the European Union will begin enforcing the new General Data Protection Regulations (GDPR) that will create one data protection standard throughout the EU. These regulations were designed to create a unified standard for personal data privacy ... »

What do Pumpkin Spice and Cyber Security Have in Common?

Give up yet? The answer, October. Why October? Continue reading to find out how pumpkin spice and cyber security are related. October is the month when the leaves begin to change, and fall, pumpkin spice is considered a food group ... »

Secure Sense First to Achieve BlackBerry Gold Partner Status in Canada

Secure Sense First to Achieve BlackBerry Gold Partner Status in Canada Burlington, Ontario, Canada — September 5, 2017 — Secure Sense today announced it is the first company in Canada to achieve BlackBerry’s Gold Partner Provider status. Part of BlackBerry’s ... »

The Importance of Bug Bounty Programs

Lately, in the news, we’ve seen a dramatic increase in organizations worldwide using a Bug Bounty model, and there have been some huge results. But what is this program and how does it work? The cybersecurity industry is in a ... »

Foundational Controls for Common Attacks

In January 2017, Tripwire completed a survey of 403 IT Security professionals about the most common attacks and how prepared organizations are to defend against them. You can read about the details here. There are two important conclusions from the ... »

A Song of Phishing and Passwords via Cylance

Phishing for Developers Hackers are targeting Chrome extension developers with phishing attacks to hijack control over their extensions in the Chrome Webstore. The phishing attacks are very well crafted to display a replica of the real Google login page and use new ... »

3 Reasons Why Employees Don’t Care About Cyber Security

According to Verizon’s 2017 Data Breach Investigations Report, which analyzes security incidents that happened last year, again reported that humans were the weak link that led to many of the cyber security breaches. So yes, cyber criminals will generally start ... »

How do SME’s Fight off Cyber Attacks?

(Carbon Black) Does the fact that well-known brands are successfully attacked and breached mean that SMEs are even more at risk of cyber attacks? If SMEs can defend themselves against cyber attacks, how should they go about doing so? We ... »

Brute Force: Anatomy of a Cyber Attack, Varonis

The media coverage of NotPetya has hidden what might have been a more significant cyber attack: a brute force attack on the UK Parliament. While for many it was simply fertile ground for Twitter Brexit jokes, a cyber attack like this that ... »

#SecurityTipTuesday: Provide Training on Cyber Threats

Let’s think back for a second on all the safety lessons we were taught as kids; for example, when you cross a street, you look both ways. It’s so obvious right… Wrong. Cybersecurity or Cyber Threat awareness training is no ... »

Here’s what we know about what could be the latest Petya ransomware outbreak

A significant ransomware attack called Petya is spreading across Europe, Russia, Ukraine and elsewhere. What we know right now Victims so far include British advertising agency WPP (WPPGY), Danish shipping firm Maersk, Russian oil/gas company Rosneft and U.S.-based pharmaceutical firm Merck. ... »

Camp Secure Sense 2017 – Recap

Wow, what a week! Camp Secure Sense has come and gone and reflecting back this was one fantastic group of customers and sponsors that attended. We’ve said it before, and we will say it again, without you there would be no ... »

Adylkuzz Malware That Could Spread More Than WannaCry

The last few days have been understandably exhausting for security teams around the globe due to the nasty ransomware WannaCry or WannaCrypt. The malware spread widely using an exploit for a Server Message Block v1 vulnerability (MS17-010) leaked by the ... »

Network Access Control: Is it Dead? The History of NAC and How the Evolving Cybersecurity Industry Changed It via Bradford Networks

As enterprise organizations continue to add BYOD, IoT devices, virtual servers/cloud services, switches, routers and offices that are connected and sharing information throughout the globe, the task of identifying and securing these endpoints can seem overwhelming. To manage these trends, ... »

Top 3 Myths of Security Awareness Training

Security Mentor has been at this a while – teaching, educating and training companies worldwide about how to work smart and securely – and in the process, transforming employee attitudes towards security. Across a wide range of industries and unique business ... »

Ten Practical Steps to Protect Your Online Privacy via Cylance

Two things happened recently which should raise an alarm for anyone concerned about their online privacy. The first was a major release by WikiLeaks on March 7, 2017 of a trove of hacks and hacking techniques allegedly employed by the CIA ... »

Bug Bounties: Risk and Reward

Today BugCrowd CEO, Casey Ellis, and founder and attorney at Cipher Law, James Denaro stepped on stage at AppSecUSA 2016 to talk about the logistics and legalities of bug bounties. They talked through some of the most common concerns people ... »

Insider Threats, What and Why You Should Be Concerned

Did you know, that insider threats have been behind the sharp increases over the past 18 months in the percentage of organizations that have experienced loss or theft of company data? According to the Ponemon Institute, three out of every ... »

iSNS Server Memory Corruption Vulnerability in Microsoft Windows Server

In November 2016, as part of Fortinet’s FortiGuard research work, it was discovered and reported an iSNS server memory corruption vulnerability in Microsoft Windows Server. On patch Tuesday of March 2017, Microsoft released the Security Bulletin MS17-012 that contain the ... »

RSA 2017 Predictions Analysis via Sophos

Sophos offered a predictions blog that was published on their Naked Security blog last week, and now it’s time to see how accurate these predictions were. Here, we will break down each prediction and see what really happened. Sophos wrote ... »

Secure Sense Named 2016 LogRhythm Partner of the Year Canada

Burlington, ON,  February 28, 2017 – Secure Sense, Canada’s fastest growing IT Security company, is pleased to announce it has been named LogRhythm’s 2016 Partner of the Year, Canada. The announcement was made at the LogRhythm Partner Summit, held in Boulder, ... »

2017 Network Security Trends Infographic

As you plan for 2017, get the facts on endpoint security and stay current on the trends. This Infographic compiles relevant data from Gartner, IDC, The Ponemon Institute, Symantec and others, on the current state of network security threats from ... »

Not all ransomware tools are created equal

In case you hadn’t heard, ransomware is big, big business. In 2016 alone, ransomware payouts are closing in on the billion-dollar mark, with a whopping 70% of companies reporting that they paid to have their maliciously-encrypted data liberated after being ... »

What’s Happening at #RSAC17

Will you be attending RSA in San Francisco this February? If so, we have the lowdown on all the exciting things our partners have planned for IT’s biggest event. From dinner parties to beer and ping pong, your go-to guide is ... »

When Robots Go Rogue – Cylance Identifies What’s Real in AI

Westworld… J.A.R.V.I.S.… Knight Rider… seems like we’ve been surrounded by artificial intelligence (AI) for a long time, doesn’t it? Thanks to Cylance we’re able to make sense of and understand exactly what Artifical Intelligence and Machine Learning really are. As other ... »

Make PCI DSS Compliance Easier with Bradford Networks

Organizations that accept credit card payments must meet the Payment Card Industry Data Security Standard (PCI DSS) compliance standards for securing payment information wherever it is collected, transmitted or stored. In today’s BYOD world, ensuring that mobile devices, IoT connections ... »

Not all ransomware tools are created equal

In case you hadn’t heard, ransomware is big, big business. In 2016 alone, ransomware payouts are closing in on the billion-dollar mark, with a whopping 70% of companies reporting that they paid to have their maliciously-encrypted data liberated after being ... »

How to Stay Protected Against Ransomware

Businesses large and small are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption to an organization’s productivity. But what does a typical attack ... »

Begin With the End(point) in Mind

Advances in artificial intelligence (AI), machine learning (ML), and mathematical algorithms have allowed cyber security professionals to bolster their threat prevention in recent years. SecOps groups have shifted focus from response to prevention, using AI/ML-powered protection products such as CylancePROTECT® to ... »

Lesson Learned: Security Awareness Training

Think back for a second on all the safety lessons we learned as kids; for example, when you cross a street, you look both ways. But some safety lessons had to evolve over time. For example, no one wore seat ... »

Secure Sense Achieves Blackberry Authorized Reseller Status

On December 13th, 2016 Secure Sense has achieved the Blackberry Authorized Reseller Status. This tier recognizes Partners that have invested in the acquisition of a solid sales knowledge of the BlackBerry Enterprise Mobility Suites. We’ve identified the customer demand for ... »

What is Next-Generation Antivirus (NGAV)? via Carbon Black

In information security, the mere mention of the word “antivirus” elicits a largely unfavorable response. I’ve heard some descriptions from infosec pros that include: “not enough,” “ineffective,” and “archaic.” There’s merit to these claims. Antivirus has long been the most ... »

Ten Cyber Security Predictions for 2017 via BeyondTrust

In the cosmic wink of an eye, 2016 is almost done. So, it’s that time of year to invoke the dark arts of prediction and try to determine how the next year will unfold. For cyber security, predicting the future ... »

LogRhythm 7.2 Now Available For Download

LogRhythm’s platform has been purpose-built to power the next-generation Security Operations Center (SOC), and with the release of 7.2, is now further optimized to help you deliver the industry’s most efficient, effective end-to-end threat lifecycle management solution. Scalability: Reduce total ... »

Secure Sense Recognized on 2016 CRN Next-Gen 250 List

Secure Sense Recognized on 2016 CRN Next-Gen 250 List Annual List Features Trailblazing Solution Providers Transforming Business with Emerging Technologies Burlington, Ontario, November 7, 2016 – Secure Sense, Canada’s Fastest-Growing IT Company, announced today that CRN®, a brand of The ... »

Yesterday’s Technology & Cyber Risk Today: Time for a Security Assessment? via Bradford Networks

For most IT teams, addressing or thinking about cyber security is a daily concern. From updating AV software to creating security profiles, most IT professionals spend a portion of their day on tasks with a goal of securing their network. ... »

IoT Bots Cause Massive Internet Outage October 21st, 2016

The real perpetrator of the widespread Internet outage on Friday, October 21, 2016 is still not known but the weapon of choice was definitely IoT devices compromised with Mirai malware. The Distributed Denial of Service (DDoS) attack that started on ... »

Securing Enterprise Networks from Rapidly Increasing Malicious Attacks

Enterprise organizations are appealing targets for hackers. These networks can provide everything from valuable personal data profiles, to financial and research data – all valuable commodities on the dark web. The interest in targeted enterprise attacks has increased dramatically, with ... »

Taming the Great Disruptor: How Managing Change Can Bolster Your Security

Did you know China is having a hard time hiring hackers to meet the demand of vulnerable U.S. security systems? Okay, well… that might be a fictional story published by satirical newspaper The Onion. But it does highlight an important ... »

Fortinet Threat Landscape Report

Periodically, Fortinet publishes a set of findings based on threat intelligence gathered from hundreds of Cyber Threat Assessments performed across the globe. This report provides analysis and insight into the threats experienced within certain industry segments and regions. Published just ... »

PowerBroker Password Safe API is Available to Developers – for Free

Calling all vendors, end users, and application developers! BeyondTrust is now offering a free method to make all of your solutions more secure if you require a user or application to provide credentials for connectivity or authentication. BeyondTrust’s PowerBroker Password ... »

Is your network causing bottle-necks that hinder growth?

We recently read a thought-provoking article authored by one of our technology partners Fortinet, titled Network Security in the New Service Provider Reality. The article discusses how networks have to evolve and embrace the growing, dynamic distribution of data, as ... »

Can Bug Bounty Programs Halt the Rise of APTs?

Security researchers recently discovered a new, advanced form of malware that is so sophisticated, it is believed only a nation state could have developed it. Known as “Project Sauron”, the malware went undetected for five years until Kaspersky Labs discovered ... »

Consumers More Concerned with Financial Data Getting Hacked than Private Information about Their Families Being Exposed

Survey also reveals consumers more likely to hear about data breaches from the news or social media — not from companies holding their data. Centrify, the leader in securing enterprise identities against cyberthreats, today released findings from its 2016 Consumer Trust ... »

“Not If, but When” – Reflections on the OPM Breach

In my previous lives as a special agent in the FBI and also as the CSO of major U.S. corporations, I had to undergo periodic background investigations, usually every five years. I hold government clearances, and it was simply one ... »

6 ways Sophos Home can keep your kids safe this school year!

In many parts of the world right now we are right in the middle of back-to-school season. Kids are getting excited to see their friends again and head back to the classroom, and are preparing for the best possible experience ... »

Phishing Attacks – Overcoming Bad User Behavior

This is gold! Big thanks to BeyondTrust for articulating phishing attacks, and how often and easy they occur! No, no we are not talking about a wild attack between a fish and a man on a boat, we’re talking malicious ... »

Overlay Malware Revealed on Google AdSense

Sipping on your first-morning coffee, and checking the news on your Android, seems pretty harmless right? Wrong. The latest strand of malware can hit any site that uses Google AdSense … and unfortunately that’s a lot of them. The malware ... »

Product Overview: CylancePROTECT

Predict. Prevent. PROTECT. Stop merely detecting attacks. Prevent them using CylancePROTECT, the only enterprise endpoint solution that blocks threats in real time BEFORE they ever cause harm. “The fundamental flaw in today’s cyber security infrastructure is that detection happens BEFORE prevention. ... »

Presenting a Cylance Unbelievable Tour: Toronto 2016!

 They say, “Seeing is believing.” And, that’s never been truer for those information security professionals who have attended a Cylance’s coast-to-coast “Unbelievable Demo Tour”. The good news if you have never been? We’ve added a stop in Toronto, for the ... »

SysAdmin Day!

Today July 29, 2016, is the 17th Annual System Administrator Appreciation Day! So we wanted to show our appreciation for all the SysAdmins out there who day in and day out work to keep our systems safe. Secure Sense Partner ... »

Five Steps to Defend Against Ransomware via LogRhythm

Over the past three years, ransomware has jumped into the spotlight of the cyberthreat landscape. Until recently, most ransomware attacks were simply opportunistic and mostly affected individual users’ or small businesses’ computers. The ransom demands have commonly been the equivalent ... »

With KeRanger, Mac Users Are No Longer Immune to Ransomware Threats via Varonis

Cybercriminals who previously targeted Windows operating systems with ransomware have expanded their customer base to include the Mac OS. Known as KeRanger, it’s the first ransomware variant detected that infects Mac users. Unlike the usual methods of entry, such as ... »

Security Trends: Managed Security Service Providers via Fortinet

Maintain your organization’s integrity, and reduce the risk across all platforms with a Secure Sense Managed Service. At Secure Sense, the safety of your data is the driving force behind providing innovative and efficient protection practices that will never compromise ... »

Is Vulnerability Management Still a “B” Horror Movie? via BeyondTrust

Here we are in 2016, and the state of information security (specifically the lack thereof) feels more like a bad Toxic Avenger sequel than a box office blockbuster. We’ve had major breaches, huge failures,  significant doubt, speculation about new technologies ... »

Is your virtualized environment at risk for a data breach?

You know a concept is solid when it grows from a good idea to a standard business practice. It can feel like the change takes place overnight, especially if the solution can quickly prove its ROI – a company adopts ... »

Camp Secure Sense 2016 – Recap

What a whirlwind week, Camp Secure Sense has come and gone and we could not have had a better group of individuals to have been there! First off, we would like to thank every single one of you, our amazing ... »

Vulnerability in GNU glibc Affecting Nutanix Products: February 2016

Advisory ID:        Nutanix-sa-003-glibc     CVE-2015-7547 Last Updated:     25 February 2016 Published:           25 February 2016 Version:               1.0 On February 16, 2016 and industry-wide critical vulnerability in the GNU ... »

FortiOS SSH Update

  On January 13, 2016 we reported about a FortiOS SSH exploit, and it looks like it has a larger scope than originally reported. After the original report, Fortinet further investigated their product line and discovered the same vulnerability on some ... »

‘Backdoor’ FortiOS Exploit!

FortiOS is an operating system that powers Fortinet’s firewall platform, FortiGate. On January 9, 2016, an exploit for an SSH backdoor in the FortiGate operating system was posted to the Full Disclosure mailing list. In a statement released by Fortinet ... »

How Do I Protect My Digital Assets?

A Guest Blog Post by Watchful Software. May 27, New York Times: Jawbone Accuses Fitbit of Stealing Information by Hiring Workers Away June 1, Credit Union Times: Email Data Breach Costs $1.3 Million September 23, Becker’s Health IT &CIO Review: Insider ... »

SecTor 2015 Recap

Every year SecTor brings together experts from around the world to share their latest research and techniques involving underground threats and corporate defences. The conference provides an unmatched opportunity for IT Professionals and Managers to connect with their peers and ... »

Sophos Guest Blog: Got encryption? Consider these 6 things to choose the right encryption solution

With the proliferation of data and the need to access it from anywhere at any time, encryption is rapidly emerging as the best place to start your data security strategy. Despite some common ideas about encryption that it is too ... »

Guest Blog Post: Centrify ‘Fundamental Security Controls Most Overlooked’

When we take a look at the security industry as a whole there is a focus on all the various APTs and Zero Day-sorts of unknown attacks. However with the rush to fight the good fight; the basics of authentication, ... »

iPhone iOS Threat: Ins0mnia Never Sleeps

FireEye researchers discovered a vulnerability (ins0mnia) in iPhone iOS allowing potentially malicious applications to run continuously in the background, even after it appears that the user has closed them. This vulnerability, critically affects non-jailbroken iOS devices: malicious software designed to ... »

Camp Secure Sense – Thank You!

First we would like to truly thank each and every one of you for attending Camp Secure Sense! We hope that you found the conference informative and worthwhile of your time. We understand the difficulty of taking time from your work ... »

FireMon Makes NGFW Policy Migration, Optimization, and Management Light Work

Secure Sense Partner FireMon recently announced its new Security Manager. With Security Manager 8.0 a host of capabilities can be utilized to maximize the efficiency of your environment’s device policy security posture, and to gain both a holistic and a ... »

FireEye Awarded First Ever SAFETY Act certification for Cybersecurity

On April 29th, Secure Sense partner FireEye became the first ever cybersecurity company to be awarded the SAFETY Act certificate by the US Department of Homeland Security. This certificate provides the company’s customers protection from lawsuit or litigation in not preventing acts ... »

Tripwire Gold Status Partner

Secure Sense is happy to announce our recent move to a Gold Status Partner with Tripwire. Currently, we are the only Gold level Canadian Tripwire reseller in all of Canada. Tripwire has played an integral role in our Security profile ... »

Secure Sense Threat Map Powered by Fortinet

Secure Sense has now teamed up with its partner Fortinet to provide a threat map—now available on our new website. The Threat Map shows real-time traffic of cyber-attacks on a global scale, using input from over 2 million FortiGate devices ... »

The FortiGate Cookbook

Looking for better productivity and reduced risk with your FortiGate but unsure where to look for help? One of our major partners Fortinet has released a unique FortiGate Cookbook to assist you. The Cookbook provides users with examples and ‘recipes’ ... »