Strong, Secure, Engaged: The Cyber Extract
Jun04

Strong, Secure, Engaged: The Cyber Extract

Lately, hardly a day goes by without media headlines stringing out the latest on the SNC Lavalin scandal with proliferous filler, like the Norman affair and China (anything to do with China). With the words ‘bribe,’ ‘breach’ and ‘bureaucrats behaving badly’ hanging over Canada’s woes, headlines were made around the world. Canada, no longer the apologetic neophyte, had slid...

Read More
The Perfect Cut-Out: When Global Politics, Espionage and Greed Converge with Technology
Mar07

The Perfect Cut-Out: When Global Politics, Espionage and Greed Converge with Technology

Fluid, agile and accessible – the malicious use of technology can range from simple, uncoordinated attacks to complex, highly coordinated persistence. Figuring as tool in the commission of a crime or as a delivery system to exploit many vectors, ‘technology for bad’ is not new, but what we have seen recently is – and it’s troubling. When mixed with...

Read More
Technology and Philosophy: An Exoteric View of Zero-Trust and Federated Identity
Feb26

Technology and Philosophy: An Exoteric View of Zero-Trust and Federated Identity

Whether it is a malicious attack or an inadvertent release on protected or classified data, a breach of government data can level a severe blow to integrity and reputation, leading to legal and legislative consequences that impact partners, allies and the public. For those reasons, cybersecurity and privacy practices for the protection of electronic information go hand-in-hand. The verification...

Read More
What Canada can learn from Israel and Estonia’s rise to cybersecurity royalty: It’s complicated
Feb05

What Canada can learn from Israel and Estonia’s rise to cybersecurity royalty: It’s complicated

A little over a year ago, I had the pleasure of presenting at CANARIE’s 2017 National Summit in Ottawa with my good friend, Roni Zehavi, CEO of Israel-based CyberSpark. A cross-section of scientists, practitioners, academics, entrepreneurs and professionals, the Summit showcased the interconnectedness of science, society and cyber–how it began, its evolutionary path, and what the future holds as this global convergence unfurls...

Read More
Implied Trust … in Supply Chain Security – Part Two
Nov09

Implied Trust … in Supply Chain Security – Part Two

Last month, my column “Implied Trust, Presumed Secure and Other Dangers of Supply Chain” covered supply chain security in the context of the network breach of a contractor for the Naval Undersea Warfare Center (NUWC) by Chinese hackers. Much to the US Navy’s chagrin, while the pilfered 614 gigabytes of US Navy data was unclassified, when aggregated it could...

Read More
Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Youtube