About Us

View As Webpage | View Archives | Email a Friend

@{mv_date_MMM d, yyyy}@
Ontario Bollards

Group behind churches in court challenge apologizes for following Manitoba judge

A group supporting multiple churches across the country in court challenges against COVID-19 public health orders is apologizing after hiring a private investigator to follow a Manitoba judge.

Cybersecurity insurance rates likely to rise amid escalating ransomware attacks

Companies looking to purchase insurance against cyberattacks in which their data is held for ransom will soon find it more expensive and difficult to obtain, a cybersecurity expert says.

RCMP investigating two areas over possible cause of fire that destroyed Lytton, B.C.

RCMP said in a news release Monday that investigators completed a "fulsome search" of an area near Lytton that is about 1 km in radius.
SPonsored Spotlight 

Top Considerations When Designing an Ergonomic Control Room

Since the control room acts as a person’s “eyes and ears,” the design of it is extremely important. When designing a control room, it’s critical to consider all factors, for example, equipment selection, operating practices, working environments and furniture choices. In addition to the design of a workstation, operators within the control room must be considered. The overall system will fail if operators are overloaded, undertaking tasks for which they are poorly trained or straining to read displays that are illegible. It is necessary to identify the limitations of the operator to minimize potential mismatches between user capabilities and system demands. » Learn more
Featured News 
Luana Pascu

Top 10 Under 40: Luana Pascu, cybersecurity researcher, Flare Systems

Top 10 Under 40 winner Luana Pascu, cybersecurity researcher, Flare Systems, reflects on what this recognition means at this stage in her career and the power of mentorship. » Watch the video
IBM Webinar

Secure Your Digital Transformation While Reducing Risk

Join IBM IAM expert Evan O'Regan as he shares his experience in how he has guided clients successfully on their Customer Identity Access Management (CIAM) and Zero Trust journeys.

Evan shares insights on how to identify and prioritize key activities, how to detect early and avoid the common CIAM and Zero Trust pitfalls that often signal eventual failure for the program, as well as how to align your CIAM and Zero Trust business case for success.

This discussion will cover a pragmatic understanding of CIAM and Zero Trust, and how to apply these principles in practice as organizations start or progress their strategy across domains such as Customer Identity and Access Management, Infrastructure and Endpoint, and in securing their Hybrid Cloud environment.
» Register now

From fighting fires to driving innovation: how cybersecurity is evolving in 2021

The security industry and its solutions have grown beyond reactive firefighting in IT, as this is an antiquated view of cybersecurity’s role in business. » Read full article

Ottawa adds national security risk assessments to federal research funding

The federal government is setting new guidelines that work national security considerations into funding criteria for university research. » Read full article

Judge sides with privacy watchdog on Google searches in ‘right to be forgotten’ case

Privacy commissioner Daniel Therrien referred the matter to the Federal Court after a man alleged Google was breaching Canada’s privacy law by prominently displaying links about him when his name is searched. » Read full article

ISC West

Location: Las Vegas, Nev.
Date: July 19-21, 2021
» More Info

17th Annual IAHSS Ontario Chapter Golf Challenge

Location: Woodbridge, Ont.
Date: August 16, 2021
» More Info