Ë

This article will compare the SaaS and on-premises software distribution approaches, discuss the main security concerns bothering SaaS users and explore possible ways of evading and handling these issues.

Read More

Publishing data of all kinds offer big benefits for government, academic, and business users. Regulators demand that we make that data anonymous to deliver its benefits while protecting personal privacy. But what happens when people read between the lines?

Read More

We are excited to announce our partnership with IDVerifact. The IDVerifact platform with DataStealth is a powerful tool in preventing data breaches by preventing unauthorized users and intruders from accessing and stealing sensitive data.

Read More

In the past decade, Salesforce Marketing Cloud has become one of the most recognizable names in Customer Relationship Management and digital marketing automation.

Read More

There are many important factors to consider when choosing a cloud provider for your cloud use cases. For organizations in heavily regulated industries, compliance with relevant regulations is one of the most important things to think about. Whether you’re planning for a single cloud workload or a hybrid multi-cloud setup, maintaining compliance for sensitive data in the cloud is imperative.

Read More

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 3, Melissa Lukings and Arash Habibi Lashkari focus on cyber security-specific legislation and cybercrime-specific Criminal Code provisions under our existing Canadian federal law.

Read More

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 7, Melissa Lukings and Arash Habibi Lashkari discuss the legal issues relating to encrypted online criminal activities, specifically those involving or facilitated by the use of Dark Web browsers and cryptocurrencies (such as TOR and Bitcoin, respectively) which provide anonymity to both parties in an illegal transaction.

Read More

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 6, Melissa Lukings and Arash Habibi Lashkari highlight the common law tort of intrusion upon seclusion and the relatively new criminal offences of cyberbullying and the sharing of intimate images.

Read More

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 5, Melissa Lukings and Arash Habibi Lashkari focus on Canada’s Anti-Spam Legislation (CASL), the federal law dealing with spam and other electronic threats.

Read More

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 4, Melissa Lukings and Arash Habibi Lashkari venture into the realm of Canadian cybersecurity laws related to interpersonal privacy, data breaches, network attacks, and other computer-related activities of a criminally malicious nature.

Read More