Monthly Archives: August 2018


The Canadian Broadcasting Corporation (CBC) reported today that Air Canada admits the personal information for about 20,000 customers “may potentially have been improperly accessed” via a breach in its mobile app, so the company has locked down all 1.7 million accounts as a precaution until customers change their passwords. A banner […]

Air Canada Says 20,000 Mobile App Users Hit by Data ...



The frequency and urgency of conversations about Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA), and Operational Technology (OT) network security are definitely on the rise. Everywhere you look there are articles, presentations, webinars, and claims of new and better solutions crowding this previously uncrowded space. To help […]

The Simplest and Most Comprehensive Way to Address ICS Risk



Editor’s note: The following was originally posted on Schneider Electric’s blog.  With their permission, and because this is an important topic, we decided to republish it here for our readers.  We applaud Schneider Electric for their willingness to address this attack against one of their customers head-on, without flinching, and […]

One Year After Triton: Building Ongoing, Industry-Wide Cyber Resilience


Guest Contributor: Kim Crawley I’ve been playing quite a bit of Assassin’s Creed Syndicate. Yes, I know the game came out in 2015. But in the past several years, I’ve played Assassin’s Creed II, Assassin’s Creed Brotherhood, Assassin’s Creed Revelations, Assassin’s Creed III, Assassin’s Creed Liberation, and Assassin’s Creed Rogue. […]

These Web Browsers Will Help You Surf the Web Stealthily


For some organizations, the ability to communicate privately is an absolute must, even a life or death situation. For these entities, which consist mostly of government agencies, law firms, and Fortune 100 companies, critical information getting into the wrong hands can be disastrous. To give you, our readers, a glimpse […]

Allowing really important people who need to talk about really ...



Guest Contributor: Aravind P R E, Product Consultant, ManageEngine A common question posed by enterprises when it comes to defending against cyberthreats is “Which operating system is most secure?” There are only a few major operating systems (OSs) available, so enterprises aren’t left with many choices. Out of the big […]

Linux Security and Patching: Are You As Safe As You ...





Today’s endpoint positive security goes far beyond the whitelisting of yesteryear.  Sometimes called OS-Centric Positive Security, current positive security models focus on the damage stage of the attack.  While attack strategies are ever changing and are nearly unlimited, the intentions of the attacker in the damage stage remains fairly static […]

What if we become a bit more positive in the ...


Guest Contributor: Rilind Elezaj, Director of Digital Marketing, Creative27, https://creative27.com Today, software is at the heart of all essential business processes, hence the need for organizations to build and enhance security into their respective information technology and application development process to avoid compliance violations, data breaches and also to protect the digital transformation […]

Integrating DevSecOps with Your App Development Lifecycle


Malwarebytes teamed up with Osterman Research to take an in-depth look at the underlying costs of fighting cybercrime across 900+ organizations globally. To gain a deeper understanding of the insights illuminated by this research, Brilliance Security Magazine spoke with Adam Kujawa, Director of Malwarebytes Intelligence. Adam explained that for the first […]

The Underlying Costs of Fighting Cybercrime