Quantcast
Channel: Securebuzz.ca » user
Browsing latest articles
Browse All 26 View Live

Image may be NSFW.
Clik here to view.

Securing networks is a form of breach insurance

For whatever reason, an employee went from gruntled to disgruntled. So he set up a back door using log me in, registering with his personal email address. Then he changed employers. Leo Cole, Trustwave...

View Article



Image may be NSFW.
Clik here to view.

History will repeat… only the devices will be different

Kevin Haley, director, Symantec Security Response, spoke with us about what he expects to see next year. Kevin Haley, Symantec The first is “People will finally begin taking active steps to keep their...

View Article

Image may be NSFW.
Clik here to view.

Removing two roadblocks to portable networks

Designed to allow users to quickly establish fast and reliable connectivity for field workers at remote or temporary worksites, LINCWorks RDA (Rugged Deploy Anywhere) self-contained portable units use...

View Article

Image may be NSFW.
Clik here to view.

Phishing has evolved – what to expect

Understanding that some of the more basic tactics aren’t as successful anymore, phishers have moved to targeted examples, and into social media. Carl Leonard, Websense Why is this so key for businesses...

View Article

Image may be NSFW.
Clik here to view.

Two reasons why you must treat wireless like a WAN

Having been in the industry for some time, Fortinet senior product manager Kevin Flynn has experienced major change adoption every few years. Kevin Flynn, Fortinet Every major change adoption requires...

View Article


Image may be NSFW.
Clik here to view.

Are you a Yes organization or a No organization?

Five years ago Dr. Walid Hejazi, professor of Business Economics, Rotman School of Management, began a study commissioned by TELUS, asking security professionals what keeps them up at night. Walid...

View Article

Image may be NSFW.
Clik here to view.

A Third reason why you must treat wireless like a WAN

Read Reasons 1 and 2 here The third factor changing network security is User Licenses. Many times firewall vendors sell according to number of users… if you have 10 users the cost is x and if 50 users,...

View Article

Image may be NSFW.
Clik here to view.

A secured buying experience is attainable

by John Maddison, vice president of marketing for Fortinet John Maddison, Fortinet Globally, the retail industry is among the top three industries to be targeted by cyber criminals. Due to the sheer...

View Article


Image may be NSFW.
Clik here to view.

Lo-tech hack overrides search engine results

Well-known marketer and Target Marketing publisher Denny Hatch noticed that Aunt Joy’s Personalized Christmas Stockings website was redirecting to a Chinese site selling something else. Aunt Joy They...

View Article

Browsing latest articles
Browse All 26 View Live




Latest Images