Canadian Centre for Cyber Security.
Our Cyber Centre blogs helps us shed light on the evolving world of cyber security.
- Protecting information while using remote technologies: Tips for academic institutions – ITSAP.00.140by Canadian Centre for Cyber Security on March 27, 2024 at 1:53 pm
- Executive teamby Canadian Centre for Cyber Security on March 26, 2024 at 3:56 pm
- Joint guidance for executives and leaders of critical infrastructure organizations on protecting infrastructure and essential functions against PRC cyber activityby Canadian Centre for Cyber Security on March 19, 2024 at 5:42 pm
- Cryptographic algorithms for UNCLASSIFIED, PROTECTED A, and PROTECTED B information – ITSP.40.111by Canadian Centre for Cyber Security on March 18, 2024 at 5:47 pm
This document aids technology practitioners in choosing and appropriately using cryptographic algorithms.
- Security tips for organizations with remote workers – ITSAP.10.016by Canadian Centre for Cyber Security on March 5, 2024 at 7:39 pm
- Cyber security tips for remote work – ITSAP.10.116by Canadian Centre for Cyber Security on March 4, 2024 at 7:39 pm
- Joint Cyber Security Advisory warns threat actors exploit multiple vulnerabilities in Ivanti Connect Secure and Policy Secure Gatewaysby Canadian Centre for Cyber Security on February 29, 2024 at 6:27 pm
- Joint cyber security advisory warns that Russian state actors are adapting their tactics to access cloud infrastructureby Canadian Centre for Cyber Security on February 26, 2024 at 12:00 pm
- Defending against distributed denial of service (DDoS) attacks – ITSM.80.110by Canadian Centre for Cyber Security on February 23, 2024 at 9:45 pm
- Website defacement (ITSAP.00.060)by Canadian Centre for Cyber Security on February 22, 2024 at 5:52 pm
- CSE urges the Canadian cyber security community to be vigilant on two-year mark of Russia’s full-scale invasion of Ukraineby Canadian Centre for Cyber Security on February 19, 2024 at 6:47 pm
- Best practices for passphrases and passwords (ITSAP.30.032)by Canadian Centre for Cyber Security on February 19, 2024 at 1:56 pm
- Digital footprint (ITSAP.00.133)by Canadian Centre for Cyber Security on February 16, 2024 at 3:30 pm
- Secure your accounts and devices with multi-factor authentication (ITSAP.30.030)by Canadian Centre for Cyber Security on February 16, 2024 at 1:07 pm
- Password managers: Security tips (ITSAP.30.025)by Canadian Centre for Cyber Security on February 14, 2024 at 9:26 pm
- Instant messaging (ITSAP.00.266)by Canadian Centre for Cyber Security on February 14, 2024 at 6:56 pm
- Top measures to enhance cyber security for small and medium organizations (ITSAP.10.035)by Canadian Centre for Cyber Security on February 14, 2024 at 3:14 pm
- How updates secure your device (ITSAP.10.096)by Canadian Centre for Cyber Security on February 8, 2024 at 1:00 pm
- Joint advisory on PRC state-sponsored actors compromising and maintaining persistent access to U.S. critical infrastructure and joint guidance on identifying and mitigating living off the landby Canadian Centre for Cyber Security on February 7, 2024 at 1:27 pm
- Biometrics – ITSAP.00.019by Canadian Centre for Cyber Security on February 5, 2024 at 5:16 pm
- Cyber security at home and in the office: Secure your devices, computers, and networks (ITSAP.00.007)by Canadian Centre for Cyber Security on February 2, 2024 at 6:31 pm
- Engaging with Artificial Intelligenceby Canadian Centre for Cyber Security on January 24, 2024 at 3:30 pm
- The threat from large language model text generatorsby Canadian Centre for Cyber Security on January 17, 2024 at 7:50 pm
Information about large language models (LLMs) including most likely threats and risks to organizations.
- How to protect your organization from malicious macros – ITSAP.00.200by Canadian Centre for Cyber Security on January 16, 2024 at 8:10 pm
- Security considerations for QR codes ITSAP.00.141by Canadian Centre for Cyber Security on January 16, 2024 at 4:55 pm
- GeekWeek 9by Canadian Centre for Cyber Security on January 12, 2024 at 4:31 pm
- Practitioner guidance for securing Microsoft Active Directory services in your organization – ITSP.60.100by Canadian Centre for Cyber Security on December 12, 2023 at 4:05 pm
- The case for memory safety roadmapsby Canadian Centre for Cyber Security on December 6, 2023 at 6:49 pm
- CSE and the Cyber release Cyber Threats to Canada’s Democratic Process: 2023 Updateby Canadian Centre for Cyber Security on December 6, 2023 at 4:01 pm
- Cyber security advice for political candidatesby Canadian Centre for Cyber Security on December 6, 2023 at 3:51 pm
- Campaign teams: Identify and handle malicious messagesby Canadian Centre for Cyber Security on December 6, 2023 at 3:51 pm
- Parliamentarians: Know how to manage an account compromiseby Canadian Centre for Cyber Security on December 6, 2023 at 3:50 pm
- Parliamentarians: Report social media account impersonationby Canadian Centre for Cyber Security on December 6, 2023 at 3:49 pm
- Fact sheet for Canadian political campaigns: Protect yourself onlineby Canadian Centre for Cyber Security on December 6, 2023 at 3:49 pm
- Fact sheet for Canadian voters: Online influence activitiesby Canadian Centre for Cyber Security on December 6, 2023 at 3:48 pm
- Cyber threats to electionsby Canadian Centre for Cyber Security on December 6, 2023 at 3:48 pm
Resources to learn more about cyber threats to elections and mitigate their impacts
- Cyber Threats to Canada’s Democratic Process: 2023 updateby Canadian Centre for Cyber Security on December 6, 2023 at 3:46 pm
Report on global cyber threats to elections and their implications for Canada.
- Loss of control of social media channelsby Canadian Centre for Cyber Security on December 1, 2023 at 6:34 pm
- Distributed denial of service attacks – prevention and preparation – ITSAP.80.110by Canadian Centre for Cyber Security on November 30, 2023 at 3:40 pm
All organizations rely on network resources and are potential targets of a DDoS attack.
- Guidelines for secure AI system developmentby Canadian Centre for Cyber Security on November 27, 2023 at 4:27 pm
Guidelines for secure AI system development to help AI system development
- Guidance for securing Microsoft Active Directory services in your organization – ITSM.60.100by Canadian Centre for Cyber Security on November 23, 2023 at 4:29 pm
- How to shop online safely – ITSAP.00.071by Canadian Centre for Cyber Security on November 22, 2023 at 1:18 pm
- Products in evaluationby Canadian Centre for Cyber Security on November 21, 2023 at 6:13 pm
- Certified productsby Canadian Centre for Cyber Security on November 21, 2023 at 6:11 pm
Websitecyber related posts:
Hack Talks
In a shocking turn of events from Hack Talks, Taiwan's biggest telco Chunghwa has fallen victim to a massive data breach by suspected Chinese hackers.
NSA Doval Cyber Security Pitch
Ajit Doval, the national cyber security adviser (NSA), was present at the 'Friends of BRICS gathering on Monday in Johannesburg, South Africa.
Credit Card Skimming Uncovered
Skimming is a type of fraud where thieves use a small device to steal credit or debit card information. They attach these devices to ATMs or other card readers.
FTC Data Spotlight Blog
The latest news and information from the FTC Data Spotlight Blog.
The Future of Cyberwarfare
Cyberwarfare in the 21st century will be waged on many fronts one of which will be a digital battlefield with no guns or bombs.
Hospitals Cyber Threats
A new study finds most hospitals are woefully unprepared when it comes to cyber threats. The impacts on patient care can be substantial.
Cyber Chat
Cyber Chat Federal News Network Helping feds meet their mission.
Phish Protection Phishing News
Advanced Phishing Protection and Anti-Phishing Software, Services and Solutions. Get Phishing Prevention against spoofing, fraud, and ransomware.
Banking Finance and Insurance
Banking Finance and Insurance Cybersecurity Where compliance is essential, but also brand, data and identity concerns.
Scientific Linux Security
Scientific Linux Security is the community's central source for information on Linux and open source security.
Banks Not Helping Scammed Customers
Big banks scams are rising across Australia, but when victims turn to their bank for help, they are, more often not able to get the money back.
Is The US-China Trade War Causing a Digital Iron Curtain?
The deepening trade war between the US and China has threatened to divide the world into two economic and technological blocs.