Thoughts, Insights, Ideas, Trends and Op-Eds

How to Protect Your Business from Ransomware Attacks

Since May 2017, malware and ransomware attacks have been on the minds of business leaders across the planet. Although most of us have enhanced our cybersecurity protocols, the war on ransomware is far from over. Over the last few weeks alone, ransomware has been able to penetrate the systems of the PGA of America and the borough of Matanuska-Susitna in Alaska.

Read More...
Recent
Most popular
ecommerce project development

Seven Programming Languages Best Suited For eCommerce Solution Development

eCommerce has evolved significantly over the past decade and is expected to surpass $4 trillion in retail and e-commerce sales by 2020, according to IBM. There are a lot of Content Management Systems (CMS), hosted solutions, and plugins freely available for you to set up your online retail presence.
cyber-security-Digi117

Cyber Security in Maritime Transportation: Preventing Data Breaches

The maritime transportation industry is in the middle of a full-blown technological revolution. Driven by digitization and automation, technology is making it much easier to effectively manage cargo and shipping while helping ships avoid collisions.
10-Canadian-Tech-Startups-to-Watch-in-2018

10 Canadian Tech Startups to Watch in 2018

The Canadian tech ecosystem is booming with startups regularly attracting some serious investment. Many of these young companies are also showing that they can overcome early challenges and grow both revenue and personnel.

What Businesses Should Know About Whitelisting

In recent years, the popularity of open source frameworks and publicly released proof of concept techniques have contributed to the rise of cyber attacks. For example, Magento, a popular cloud-based e-commerce platform with an open-source ecosystem recently had almost a 1,000 compromised CMS admin panels.

How to Reduce Security Flaws and Vulnerabilities in the Software Code

Software today is often riddled with security flaws and vulnerabilities that bad actors can leverage to gain access to IT systems. In fact, according to a study (based on 268 penetration tests) conducted by security firm Rapid 7, only 16% of the software companies investigated were in the clear.