Archive

Archive

Protect Your Data With Super Easy File Security Tricks!

By: Andy Green Data security is an all-encompassing term. It covers processes and technologies for protecting files, databases, applications, user accounts, servers, network logins, and the network itself. But if you drill down a little in your thinking, it’s easy ... »

The Canadian Bacon Series: Creating a Supported Security Architecture

by: Jason Maynard As security practitioners we pride ourselves on our ability to respond quickly to remediate threats and minimize the impact they have on our business. We all know at some point a breach will happen. But the constant ... »

How to Use Incident Response Reporting to Drive Cyber Security Decisions

In its Q1-2019 Forrester Wave™ report, Forrester Research recognized FireEye as the undisputed industry leader in the Cybersecurity Incident Response Services category. Our unique synthesis of digital forensics, human intelligence (HUMINT) and a global machine learning network generates innovations such ... »

APT shutout: Building for the Cyber Security Playoffs

By: Matthew Balcer – SentinelOne Canada Most CIOs, CSOs, Security Analysts, Security Admins wake up every morning assuming that the solutions they’ve put in place, the solutions they have invested in on behalf of their organization, have kept their environment safe. ... »

Let’s Get Offensive – The Pros and Cons of Diverse Security Testing Methods

Most IT teams only know if they are protected against a cyber attack when one actually occurs. Organizations spend considerable resources to ensure that they have the best defenses in place. Yet the only way to ascertain those tools’ effectiveness ... »