Risky Business: Wading through security and risk-reduction standards
Jul13

Risky Business: Wading through security and risk-reduction standards

If you are a CISO, DISO or security practitioner, you’ve likely been drawn into the beleaguered topic of security and risk-reduction standards. You probably also know that a sure fire way to single out the security wonks at your next meeting, conference or cocktail reception, is to simply muse aloud: “I wonder which standard is most effective in reducing...

Read More
Artificial Intelligence: Public Safety, Privacy and Ethics
Jun08

Artificial Intelligence: Public Safety, Privacy and Ethics

Its safe to say, artificial intelligence (AI) is not a trend. Beyond robot-dogs slipping on banana peels, the innovative capabilities AI will bring to business, government and the sciences will be transformative. Only imagined in science fiction, AI is poised to challenge and blur our concepts of computing and the ‘natural’ human. This will require governments and sectors to...

Read More
Cyber ranges and benefits pairing for cyber skills development and cyber warfare
May14

Cyber ranges and benefits pairing for cyber skills development and cyber warfare

Although not new, cyber ranges have recently created a buzz with technology stakeholders and security practitioners on more than speculative benefits. In North America in particular, cyber ranges have garnered attention on their ability to solve what has become a global cyber capability issue rooted in a cyber skills shortage and a growing, long-term demand. Within this, cyber warfare...

Read More
Cybersecurity in aviation should be a piece of cake
Nov06

Cybersecurity in aviation should be a piece of cake

By: Valarie Findlay No industry is immune to cyber breaches, but few evoke visions of catastrophic loss and devastation than an aviation cyber attack. Despite being the safest mode of transport, the aviation industry’s potential for large-scale loss makes it a high-value target for malicious actors. Aviation’s inextricably connected systems and processes present numerous contact points for cyber threats,...

Read More
Threats in the Hyper-Connected World
Jun26

Threats in the Hyper-Connected World

By Valarie Findlay For as much as “white-hat” technologists (the good guys) have made advancements, it has become abundantly clear that the risks remain and go beyond technological vulnerabilities and remedies. In other words, cyber-threats have become much more than surreptitious, malicious software that attack our assets; likewise fighting cyber-threats doesn’t always require a technical safeguard. Formed decades ago, the...

Read More
Body-Worn Cameras: Not Seeing the Forest for the Technology?
May03

Body-Worn Cameras: Not Seeing the Forest for the Technology?

By: Valarie Findlay For many Canadian law enforcement organizations, getting their feet wet with the technology through pilot programs couldn’t have happened fast enough. With several high-profile incidents regarding officers’ use of force setting off public outcry and civil rights concerns in recent years, it may be a step in the right direction. However, several organizations have been pulling back...

Read More
Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Youtube