Security

Latest

Risk Decisions in an Imperfect World
Archive ·

Risk Decisions in an Imperfect World

Security is often spoken of in absolutes. Is this secure? Is that insecure? The reality is that security is a spectrum. It is a series of implicit and explicit decisions made to meet the business needs within an acceptable risk tolerance.

When Cyber Attacks
Archive ·

When Cyber Attacks

Technology is omnipresent in our lives. From the time you wake up and check the weather to the time your head hits the pillow, you will have spent at least a quarter of your day interacting with technology. What are the privacy and security implications?

Biometrics and Bugs
Identity ·

Biometrics and Bugs

Getting users to accept new security controls is an uphill battle, any setback makes it harder for any solution to push out additional security measures.

E-transfer Security
Archive ·

E-transfer Security

CBC's Go Public pointed out the rising rates of e-transfer fraud and consumers are shocking. The expectation was that e-transfers were safe and convenient...turns out, not so much.

Cybersecurity Patching in Context
Archive ·

Cybersecurity Patching in Context

Letting customers know about a security vulnerability is never an easy thing. From the logistics of it to the reputation management issues. But this is a critical aspect of delivery software and services. What's the best way to tackle this problem?

AppSec Is Dead
Archive ·

AppSec Is Dead

Is application security (AppSec) dead? Did it every really work? Let's discuss...

Zoom.us & The Real Cybersecurity Problem
Archive ·

Zoom.us & The Real Cybersecurity Problem

Zoom.us had a pretty egregious security issue this week. Their response was poor despite the best efforts for responsible disclosure by the security research who discovered the issue. While this issue has dominated tech headlines, the real issue is much more significant and commonplace.

NBA Free Agency vs Security Policies
Archive ·

NBA Free Agency vs Security Policies

Cybercriminals don't always use complicated technical attacks to get around your cybersecurity. Sometimes—probably more often than we care to admit—it's the really simple stuff that works and what's simpler than an email?

Huawei, Android, and Cybersecurity
Archive ·

Huawei, Android, and Cybersecurity

Huawei was recently put on the US Entity List from the US Department of Commerce. That essentially means that it needs a license to receive technology from US companies...a license that is a default "no" and in this political climate, a definite "no".

James Harden & Cybersecurity Policy
Archive ·

James Harden & Cybersecurity Policy

The NBA playoffs are in full swing and there's a huge rules controversy around one superstar's—James Harden—jump shot. Is it a foul? Regardless of the answer, it pushes the rules to the limit. The same thing happens in cybersecurity. People just trying to get their job done will push th

Cybersecurity & Technical Debt
Archive ·

Cybersecurity & Technical Debt

A recent report from the Canadian Commission for Complaints for Telecom-television Services (CCTS) saw a dramatic increase in complaints with billing being one of the top reasons. That's not especially noteworthy in an industry known for poor customer service...until you dig a little dee

Exposing Secrets In Code
Archive ·

Exposing Secrets In Code

A recent study by NCSU found that there are way more API keys and tokens uploaded to GitHub than previously thought. In fact, there's almost a near constant stream of secrets being exposed...why?!?