View As Webpage | View Archives

Share on TwitterShare on FacebookShare on Google+Share on LinkedInEmail a Friend
MMMM d, yyyy
FEATURED NEWS: Six types of cyber criminals defined
If you click the images or links in the Sponsor Spotlight advertisement we will provide your subscription contact information only to that sponsor.

Guidance about anti-terrorism laws remains secret

The federal government’s directions to Canada's spy agency about using contentious new anti-terrorism laws won't be made public >> Read full article

Airport wants fingerprint check of Uber drivers

A battle is brewing in Atlanta over background checks for drivers with Uber, Lyft and other ride-booking firms >> Read full article

Suspect arrested on fear of terrorism, RCMP say

Police arrested Kevin Omar Mohamed under a little-used section of the Criminal Code which allows authorities to detain someone who might commit a terrorist act >> Read full article

 Sponsor’s Message 
IBM Life on the Edgepoint Webinar

Complimentary Webinar by IBM

As our online world evolves, network endpoints—which include desktops, mobile devices, servers and kiosks—are proliferating at a rapid pace, making organizations increasingly vulnerable to cyber threats. Traditional security solutions — such as anti-virus and anti-spyware software—can’t keep up, and no longer offer sufficient 24/7 protection against today’s sophisticated cybercriminals.
In IBM’s upcoming April 5 webinar, Life on the Edgepoint: Winning the Battle Against Cyber Attacks, Sherri Thom, Director of IT at Stewart McKelvey, will provide a first-hand account of her firm’s experience in rolling out her security strategy.
>> Register Now

 Featured News 
Six types of cyber criminals defined

Six types of cyber criminals defined

Threat intelligence experts at BAE Systems have profiled six prominent types of cyber criminals and exposed how they can cause harm to businesses. The intention of the company’s information campaign is to help enterprises understand the various enemies they face so they can better defend against cyber attacks. “The Unusual Suspects” is based on research that uncovers the motivations and methods of the most common types of cyber criminals. These include the mule, the activist and the insider. >> Learn More…


Several agencies use new information-sharing rules

At least four federal agencies have used the controversial information-sharing powers that are part of the omnibus security bill known as C-51 >> Read full article

Civil rights groups question use of Stingray device by police

A legal advocacy organization has filed an appeal with the B.C. privacy commissioner after Vancouver police refused to confirm they use a mass-surveillance device >> Read full article

Hudson’s Bay Company agrees to educate staff about racial profiling

The retailer has settled a discrimination complaint related to a security guard questioning a 77-year-old African Canadian woman about her purchase of a rug >> Read full article

 Event Calendar 

ISC West

Location: Las Vegas, Nev.
Date: April 6-8, 2016 >> More Info

Border Security Expo

Location: San Antonio, Tex..
Date: April 13, 2016 >> More Info

Security Canada East

Location: Sheraton Laval, Laval, QC
Date: April 20, 2016 >> More Info

ASIS Toronto Chapter 23rd Annual Best Practices Seminar

Location: Markham Event Centre
Date: April 21, 2016 >> More Info

Security Canada Alberta

Location: River Cree Resort & Casino, Edmonton, Alberta
Date: May 11, 2016 >> More Info

Tracking Terrorism Symposium: Countering the Threat of Violent Extremism

Location: Oshawa, Ont.
Date: May 17, 2016 >> More Info

Port Secure

Location: Toronto, Ont.
Date: May 18, 2016 >> More Info

The World Conference on Disaster Management (WCDM)

Location: Mississauga, Ont.
Date: June 7, 2016 >> More Info

Focus On Drones

Location: Richmond Hill, Ont.
Date: June 7, 2016 >> More Info