About Us

View As Webpage | View Archives | Email a Friend

@{mv_date_MMM d, yyyy}@

Ban federal use of facial recognition tools, groups urge Trudeau government

Dozens of groups and individuals working to protect privacy, human rights and civil liberties want the Trudeau government to ban the use of facial-recognition surveillance by federal law-enforcement and intelligence agencies.

Coronavirus scams: guard against fraud cures and other cons

Watchdog groups and authorities report a surge of complaints about scams targeting people who fear COVID-19 or need money due to lost income.

Ontario redesigns driver's licence cards to prevent fraud, identity theft

The Ontario driver's licence is getting a facelift that the Progressive Conservative government said will help combat fraud and identity theft.
Sponsored Spotlight 
Evista Webinar

How to Protect Sensitive Data

When an employee steals sensitive data from a company it can cause irreparable harm to the reputation and finances of that business. When these events do occur, there is recourse available. In the process of performing a digital forensics examination, it can be determined what data was taken, how was taken and who took it. Data theft can take multiple forms, including stealing data internally from issued company computers and mobile phones or using personal devices to store work product. Data can even be exfiltrated from a company externally after an employee has left the organization by connecting to shared drives and cloud accounts. Whether intellectual property was stolen using complex means, or through a simple exfiltration by emailing sensitive data to personal email accounts or uploading it to personal cloud storage, these methods all leave forensic artifacts on electronic devices that can be utilized as evidence in litigation. » REGISTER NOW
Featured News 

Frost & Sullivan analyzes the future of privacy and cybersecurity

Advanced technologies such as AI, blockchain and continuous authentication to transform the connected era in 2030. » Read full article

Global security industry shifts to service-based solution offerings post-pandemic

The security industry has tremendous investment opportunities despite the economic slowdown witnessed due to COVID-19. » Read full article

Employee charged in 407 ETR data breach involving 60,000 customers

The suspect is charged with mischief to data and unauthorized use of a computer. » Read full article

DHS may require US citizens be photographed at airports

Facial recognition is being tested by several airlines at a number of U.S. airports. » Read full article

Cybersecurity perspectives

Location: Online
Date: Oct. 26, 2020
» More Info

Security Canada

Location: Online
Date: Dec. 2-3, 2020
» More Info

Focus On Healthcare Security

Location: Virtual Summit
Date: Dec. 3, 2020
» More Info