Cyber Security Articles & News

The Changing Role of the White Hat Hacker

The word “hacker” existed long before it entered the public consciousness as a reason to practice good cybersecurity habits. It goes back to the 1960s, where computer culture was developing at MIT. The Jargon File, a glossary for computer programmers established in 1975, has eight definitions for hacker (or nine, if you include the hat tip to the original meaning of the term as “someone who makes furniture with an axe”).

Read More >
Top 4 White Hat Hackers Everyone Should Know

Top 4 White Hat Hackers Everyone Should Know

Read More »
KnowBe4 Introduces New “Social Engineering Indicators” Training Method

KnowBe4 introduces a new training method that IT managers can use to better manage continually increasing social engineering threats

Read More »
FBI agent explores how social engineering attacks get a boost from social media

Cybercriminals use social networking outlets to tailor their social engineering attacks, increasing their chance of success. A solution is in the works to mitigate the effects of these threats.

Read More »
WATCH: Computer Hacker Shares How to Keep Personal Information Safe

A man who was known as a thief to the FBI and a ghost to many corporations visited the city of Laredo to give some advice about cyber hacking.

Read More »
BEST BOOK OF THE MONTH!!! Amazon Books: The Art of Invisibility: The World’s Most Famous Hacker Teaches you How to be Safe in the Age of Big Brother

Announcement on Kevin's twitter here.

Read More »
SEE LIVE: Western Canada Information Security Conference May 16, 2017

ISACA® Winnipeg Chapter is proud to announce the 2017 Western Canada Information Security Conference (WCISC), the only Information Security and Control Conference in Manitoba!

Read More »
SEE LIVE: 4 MAY 2017: The Art of Invisibility: Kevin Mitnick in Conversation with Jeff Lanza

This program is made possible through funding from the Ewing Marion Kauffman Foundation.

Read More »
BOOK REVIEW: Phishing in your own Backyard

This week I’ve been reading Kevin Mitnick’s classic book “Ghost in the Wires” on the recommendation of our Senior Director of IT. The book itself is an awesome read, though it’s fair to say the memoirs of Kevin’s social engineering attacks are chilling for anyone tasked with safeguarding patient data.

Read More »
Hackers Aren’t Trying to Hack Your Systems, They’re Doing this Instead…

t’s easy to assume your company will be safe with security systems in place but this view just won’t cut it against the latest breed of hackers.

Read More »