The Communications Security Establishment (CSE) is Canada’s centre of excellence for cyber operations. Part of CSE is the Canadian Centre for Cyber Security (CCCS), Canada’s technical authority on cyber security. The Cyber Centre is the single unified source of expert advice, guidance, services, and support on cyber security for Canadians and Canadian organizations. As one of ...
Recent analysis by Fitch Ratings has shown an increase in Russian cyberattack activity on businesses and government agencies with the risk of spillover attacks on non-primary targets becoming much more widespread. As part of their recent invasion, Russia blitzed Ukraine with DDoS (distributed denial-of-service) attacks and data-wiping malware. Russian government attacks typically focus on other ...
Recent high profile DDOS (Distributed Denial of Service) attacks have put a spotlight on this type of cyberattack and have made many business owners wonder about their own vulnerability. In late September, the large VoIP services company, Bandwidth.com, endured a rolling DDOS attack which affected their operations for a number of days, and then in ...
Part 5: The IBM “Immune System” Approach: a Security Chastity Belt? It has been awhile — I apologize! I have been busy attaining accreditation from the world’s largest security vendor, IBM! At IBM they speak about an “immune system” approach as opposed to “layers” and it’s a remarkable difference. According to them, many companies have ...
Part 4: Define, Assess and Prioritize Your Security Architecture “And a step backward, after making a wrong turn, is a step in the right direction.” ― Kurt Vonnegut, Player Piano Before we commence our discussion on security architecture as part of our security evolution, I’d like to share a recent relevant experience. While scoping ...
Skyway West’s DNS Firewall is delivered as a cloud service located in Canadian Internet Exchange points and powered by CIRA (Canadian Internet Registration Authority). At the heart of Skyway’s DNS Firewall is a policy-enabled DNS server, which analyzes every outgoing query and response, comparing them to a block list to enforce security. This block list ...
April 26, 2018 Ongoing work to update customer premise routers continues. Rolling updates will be seen for some services. Expected outage will be brief and occur after 10 or 11 pm for most customers. We also performed some minor adjustments of our fiber core routing overnight. April 25, 2018 Updates to core services have been ...
Part 3: What to Expect in a Security Assessment Hi again fellow cyber-security concerned business people! In my last security post (Five Areas for Complete Coverage), I promised to begin our cyber security journey with a “security assessment”. First, make sure you go into that security assessment in the right frame of mind. Focus on ...
Part 2: Five Areas for Complete Internet Security Coverage Hello again cyber security-concerned business people… Last post I wrote about the somewhat confusing landscape of cyber security. Let’s continue on that theme with an eye to removing some of the confusion. “One step at a time” is the required approach — this isn’t exactly rocket ...
Part 1: The Landscape of Internet Security in 2018 It seems that each new day brings startling new statements, broadcast loudly from internet security vendors. Statements like “It’s not a matter of if but when”, or “60% of websites are infected”, or “40% of ransomware victims declare bankruptcy”, or “The average discovery of infections in ...