Ë

Security Features

Publishing data of all kinds offer big benefits for government, academic, and business users. Regulators demand that we make that data anonymous to deliver its benefits while protecting personal privacy. But what happens when people read between the lines?

Read More

Did you know that there are changes coming in how the Bank Identification Number (BIN, also known as Issuer Identification Number, or IIN) is encoded and used on payment cards?

Read More

Microsoft on Thursday warned thousands of its cloud computing customers, including some of the world’s largest companies, that intruders could have the ability to read, change or even delete their main databases, according to a copy of the email and a cyber security researcher.

Read More

Criminal hackers will try almost anything to get inside a profitable enterprise and secure a million-dollar payday from a ransomware infection. Apparently now that includes emailing employees directly and asking them to unleash the malware inside their employer’s network in exchange for a percentage of any ransom amount paid by the victim company.

Read More

We are excited to announce our partnership with IDVerifact. The IDVerifact platform with DataStealth is a powerful tool in preventing data breaches by preventing unauthorized users and intruders from accessing and stealing sensitive data.

Read More

Attacks on the life sciences and healthcare sectors (healthcare providers and health technology, medical device, pharmaceutical and biotechnology companies) increased significantly in the last year. We outline these risks below and provide steps companies can take to mitigate them.

Read More

Tripwire announced the results of a research report that evaluated cloud security practices across enterprise environments in 2021.

Read More

There are many important factors to consider when choosing a cloud provider for your cloud use cases. For organizations in heavily regulated industries, compliance with relevant regulations is one of the most important things to think about. Whether you’re planning for a single cloud workload or a hybrid multi-cloud setup, maintaining compliance for sensitive data in the cloud is imperative.

Read More

Follow our final 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 9, Melissa Lukings and Arash Habibi Lashkari discuss the Digital Charter Implementation Act, 2020, which was tabled by the government on November 17, 2020, along with its progeny: the Consumer Privacy Protection Act (CPPA) and the Personal Information and Data Tribunal Act.

Read More

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 3, Melissa Lukings and Arash Habibi Lashkari focus on cyber security-specific legislation and cybercrime-specific Criminal Code provisions under our existing Canadian federal law.

Read More