IoT Botnets on the Rise Over the last two years, the criminal community has shifted its focus away from exploit kits as a mean of payload… Daniel Smith | October 2, 2018
Protecting Sensitive Data: The Death of an SMB True or False? 90% of small businesses lack any type of data protection for their company and customer information. The… Mike O'Malley | September 26, 2018
Cities Paying Ransom: What Does It Mean for Taxpayers? On September 1, Ontario’s Municipal Offices experienced a cyberattack that left their computers inoperable when Malware entered its systems and… David Hobbs | September 25, 2018
Don’t Let Your Data Seep Through The Cracks: Cybersecurity For the Smart Home Technology and wireless connectivity have forever changed households. While we don’t have the personal hovercrafts or jetpacks that we were… Anna Convery-Pelletier | September 20, 2018
Millennials and Cybersecurity: Understanding the Value of Personal Data From British Airways to Uber, recent data breaches have shown how valuable our data is to cybercriminals – and the… Jeff Curley | September 19, 2018
Adopt TLS 1.3 – Kill Two Birds with One Stone Transport Layer Security (TLS) version 1.3 provides significant business benefits by making applications more secure, improving performance and reducing latency… Prakash Sinha | September 13, 2018
Defending Against the Mirai Botnet When attacks from the Mirai botnet hit the network in 2016, we all knew something was different. You could feel… Ron Winward | September 12, 2018
DDoS Protection is the Foundation for Application, Site and Data Availability When we think of DDoS protection, we often think about how to keep our website up and running. While searching… Daniel Lakier | September 11, 2018
Understanding the Power of Big Data For Your Business Data might just be the biggest asset your company has. It is more than just collecting numbers. The right metrics… Ashley Lipman | September 6, 2018
Rate Limiting-A Cure Worse Than the Disease? Rate limiting is a commonly-used tool to defend against application-layer (L7) DDoS attacks. However, the shortcomings of this approach raises… Eyal Arazi | September 5, 2018
The Evolution of IoT Attacks What is the Internet of Things (IoT)? IoT is the ever-growing network of physical devices with embedded technologies that connect… Daniel Smith | August 30, 2018
Protecting Sensitive Data: What a Breach Means to Your Business Data breaches have made big headlines in recent years, from Target to Equifax to Hudson’s Bay Co’s Saks and Lord… Mike O'Malley | August 29, 2018