Ë

As Canadians worry about cyberattacks, new poll research finds less than half of businesses are very confident in their ability to spot and fend off a major cyber breach

Read More

This article will compare the SaaS and on-premises software distribution approaches, discuss the main security concerns bothering SaaS users and explore possible ways of evading and handling these issues.

Read More

On September 21, the National Assembly of Quebec adopted the Act to modernize legislative provisions as regards the protection of personal information. The adoption of this Act puts an end to a lengthy legislative process which started on June 12, 2020 when Bill 64,

Read More

Publishing data of all kinds offer big benefits for government, academic, and business users. Regulators demand that we make that data anonymous to deliver its benefits while protecting personal privacy. But what happens when people read between the lines?

Read More

Did you know that there are changes coming in how the Bank Identification Number (BIN, also known as Issuer Identification Number, or IIN) is encoded and used on payment cards?

Read More

Microsoft on Thursday warned thousands of its cloud computing customers, including some of the world’s largest companies, that intruders could have the ability to read, change or even delete their main databases, according to a copy of the email and a cyber security researcher.

Read More

Welcome to our multi-part series of articles on e-commerce security and compliance. In this article, we look at the current PCI DSS v3.2.1 compliance framework for shopping carts and payment pages.

Read More

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 3, Melissa Lukings and Arash Habibi Lashkari focus on cyber security-specific legislation and cybercrime-specific Criminal Code provisions under our existing Canadian federal law.

Read More

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 7, Melissa Lukings and Arash Habibi Lashkari discuss the legal issues relating to encrypted online criminal activities, specifically those involving or facilitated by the use of Dark Web browsers and cryptocurrencies (such as TOR and Bitcoin, respectively) which provide anonymity to both parties in an illegal transaction.

Read More

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 6, Melissa Lukings and Arash Habibi Lashkari highlight the common law tort of intrusion upon seclusion and the relatively new criminal offences of cyberbullying and the sharing of intimate images.

Read More