Printer icon Print Page
Hot Topics in Security and Safety

Learning Lessons From Hurricane Response and Recovery

by
  • Rachael Bryson
| Oct 02, 2018
Hurricane Florence’s devastation has been felt across North Carolina. The storm, which was thought at one point to make landfall as a Category 4 hurricane, made landfall on September 13, 2018, as a Category 2. In the days leading up to the storm, as many as 1.7 million people were told to evacuate the coast and emergency measures were enacted to protect life and critical assets.

Ottawa’s Emergency Response: What Went Right

by
  • Rachael Bryson
| Sep 26, 2018
On Friday, September 21, 2018, the Ottawa region and western Quebec experienced a series of tornadoes that left a trail of destruction across many communities. However, three things went really well during the tornado response.

The 9/11 Generation Is Coming of Age

by
  • Rachael Bryson
| Sep 11, 2018
The children born on 9/11 will turn 17 this year, which means they have no living memory of the day’s events in New York, Washington, D.C., and Pennsylvania. But as they come of age, they do have the potential to be a major force for social change.

From Guns and Bombs to Trucks and Cars: An Evolving Terror Toolkit

by
  • Satyamoorthy Kabilan
| Jun 22, 2018
During the last three decades, the tools and tactics employed by terrorists and other violent extremists have changed dramatically as they rapidly adapt and evolve.

Defining the Term “Insider Threat”

by
  • Rachael Bryson
| Jun 07, 2018
Only 13.9 per cent of respondents to the 2012 survey indicated that their organization had an internal working definition of the term. The results of the 2017–2018 survey demonstrate that some minor progress has been made on implementing this recommendation.

Building Cyber Resiliency

by
  • Rachael Bryson
| Apr 30, 2018
Building cyber resilience is about more than preventing attacks; it’s about being able to limit the impact of attacks that do occur, and being able to resume regular business faster.

Could the Toronto Van Attack Be Leveraged to Create a National Security Concern?

by
  • Satyamoorthy Kabilan
| Apr 26, 2018
It’s possible for incidents like this to be leveraged and used by others, including nation states, to generate societal friction and amplify divisions, thereby constituting a potential national security threat.

Cyber Security Target Evolution: From Money and Data to Processing Power

by
  • Satyamoorthy Kabilan
| Mar 01, 2018
One of the biggest challenges we face in cyber security is the swift evolution of the threat landscape. With increasing complexity, rapid adoption of new technologies, and emerging risks such as zero-day vulnerabilities, it is impossible to guarantee that any system is 100 per cent secure.

Measuring Organizational Confidence in Addressing Insider Threats

by
  • Rachael Bryson
| Jan 31, 2018
Examining organizational confidence around identifying and managing insider threats.

Updating Our Knowledge of Insider Threats

by
  • Rachael Bryson
| Jan 18, 2018
The actions of an insider posing a threat, whether malicious or not, can have catastrophic results. In fact, perfectly functioning security practices that are focused on mitigating external threats can fail to prevent, or even exacerbate the impact of insider threats.

Monthly Newsletter

If you enjoyed this article, get regular updates by signing up to our monthly newsletter.
 
 
 

RSS Feed