Welcome to the 30-in-30 blog campaign! I'm excited to launch this initiative, which involves publishing a brand new blog post every single day for the next 30 days. I will not mince words about this. It is hard to keep it up, stay engaging, relevant and interactive. More about this campaign is at the end [...]
Category: security
30in30 – Post 2 – The Rise of Artificial Intelligence in Cybersecurity: Separating Hype from Reality
Welcome to the 30-in-30 blog campaign! I'm excited to launch this initiative, which involves publishing a brand new blog post every single day for the next 30 days. I will not mince words about this. It is hard to keep it up, stay engaging, relevant and interactive. More about this campaign is at the end [...]
30in30 – Post 1 – Why Managed Detection and Response is a Must-Have in Your Cybersecurity Strategy
Welcome to the 30-in-30 blog campaign! I'm excited to launch this initiative, which involves publishing a brand new blog post every single day for the next 30 days. I will not mince words about this. It is hard to keep it up, stay engaging, relevant and interactive. More about this campaign is at the end [...]
Calculating the cost of a breach – Casino Edition (Spoiler – over $36M)
Ransomware attacks have become increasingly common in recent years, and their impact can be devastating to businesses of all sizes. On April 16th 2023, Canadian company Gateway Casinos was hit by a ransomware attack that forced them to shut down their operations temporarily. (As of the publishing date of this article April 25th 2023, the [...]
Episode 04 – The evolution of Zero Trust Architecture, ZTNA and SASE – The Canadian Cybersecurity Podcast
On todays episode: I'll be talking with Evgeniy Kharam, who has decades of experience from being a Cybersecurity Specialist in the Israeli Navy, to working at Check Point Software, to becoming the VP of Cybersecurity Architecture at the Herjavec Group. Evgeniy has also created the Security Architecture Podcast, in which he talks to executives from [...]
Episode 03 – Level-up your Red Team campaigns with RedStack – The Canadian Cybersecurity Podcast
On todays episode: I'll be talking with Ermis Catevatis, who is an offensive security professional, with a background in red teaming, physical penetration testing and software development. We'll be talking about a new platform that he developed to help upskill red teams, and provide organizations with capabilities to test their internal security posture against new [...]
The Canadian Cybersecurity Podcast – Episode 02 – The state of the cyber insurance market in 2023
On todays episode: I'll be talking with Lucas Black, who is a CISSP and Principle Security Solution Architect at CDW Canada. We'll be talking about the evolution of cyber insurance, the challenges that organizations face due to the changing threat landscape, and the priorities that need to be focused on for 2023 and beyond. https://youtu.be/sPhMhuegXUo [...]
The Canadian Cybersecurity Podcast – Episode 01 – The disparity between the number of cybersecurity professionals in the industry and the vacant positions in the market.
On todays episode: I'll be talking with Junior Williams, who is a CISSP, advisory board member of ElCanHack, and the Director of Cyber Risk at MIS3, We'll be talking about the disparity between the number of cybersecurity professionals in the industry and the number of vacant positions in the market. https://www.youtube.com/watch?v=JvK3bUYgKz0 https://open.spotify.com/episode/66wYkBNCgvH8tTRIpX1cBb Below is the [...]
Trust and bias in AI – public sentiment and regulatory frameworks
How do we have trust in a system that operates without oversight and inherent security? Trust and bias in artificial intelligence (AI) are becoming increasingly important issues as AI systems are being deployed in a variety of settings, including criminal justice, healthcare, and hiring. At the same time, the public's sentiment towards AI is complex, [...]
The unspoken truth of Ransomware payouts in Canada
Canadians pay more often for ransomware attacks, and I'll try to explain why I suspect that is.There are a few key parts to a ransomware attack that I'm going to break down first: Initial access TTPs Ransom request Payouts 1) Initial access This is done via a number of ways called threat vectors. Phishing, social [...]