• All
  • Company
  • Industry
  • News
  • Partners
APT shutout: Building for the Cyber Security Playoffs

By: Matthew Balcer – SentinelOne Canada Most CIOs, CSOs, Security Analysts, Security Admins wake up every morning assuming that the solutions they’ve put in place, the solutions they have invested in on behalf of their organization, have kept their environment safe. This seems more like a general with his troops standing in a room with a ticking timebomb watching the clock hoping the triggering mechanism will fail. Over 80% of Canadian companies...

Read More
7 Signs You have a Weak Password

As we welcome 2019 and set goals for the year ahead, we think it's the perfect time to rethink and refresh your all your weak passwords. It a great time to refresh those stale and potentially leaked passwords you’ve been hanging on to (and reusing!) for so long. In December 2018, we saw yet another huge data breach, this time at question-and-answer site Quora, with over 100 million user passwords said to...

Read More
Attention Holiday Shoppers! 5 Tips To Beat Seasonal Cybercriminals
Attention Holiday Shoppers! 5 Tips To Beat Seasonal Cybercriminals

The festive spirit isn’t the only thing that’s infectious as the 2018 holiday season approaches. It’s typically the time of year when we see an uptick in cyber theft. With online spending expected to increase 14.8% compared to 2017, representing a huge $124.1 billion of internet commerce, it’s a mouth-watering proposition for criminals. With retailers swamping inboxes with millions of promotional emails, and hungry shoppers desperately looking for great buys, it’s the perfect time...

Read More
How Fileless Malware Changes The Way We Treat Cyber Threats

Traditionally, AV and other endpoint security products have focused on files (executables) to detect and prevent malware. There are several advantages to this. Files can be hashed, queried in reputation services, examined by both static analysis and machine learning, and easily excluded for false detections. These advantages lead to a problem for attackers. The name of the game is monetary gain: threat actors aim for cost-effectiveness, seeking the highest return for the...

Read More