View As Webpage | View Archives

Share on TwitterShare on FacebookShare on Google+Share on LinkedInEmail a Friend
FEATURED NEWS: Focus On Cyber Security provides expert advice on effective network protection
If you click the images or links in the Sponsor Spotlight advertisement we will provide your subscription contact information only to that sponsor.

Toronto police conclude pilot project for body-worn cameras

The body-worn camera pilot project has moved into its evaluation phase and recommendations will be presented to the police chief by the end of June >> Read full article

FBI hacks iPhone, ends legal battle

The fight pitting the FBI against Apple ended unexpectedly after the FBI said it hacked into a mass shooter's iPhone without Apple's help >> Read full article

Ontario man detained without charge now faces terror charge

A man detained out of fear he might commit a terrorist act was charged days later with a terrorism-related offence >> Read full article

 Sponsor’s Message 
IBM Life on the Edgepoint Webinar

Complimentary Webinar by IBM

As our online world evolves, network endpoints—which include desktops, mobile devices, servers and kiosks—are proliferating at a rapid pace, making organizations increasingly vulnerable to cyber threats. Traditional security solutions — such as anti-virus and anti-spyware software—can’t keep up, and no longer offer sufficient 24/7 protection against today’s sophisticated cybercriminals.
In IBM’s upcoming April 5 webinar, Life on the Edgepoint: Winning the Battle Against Cyber Attacks, Sherri Thom, Director of IT at Stewart McKelvey, will provide a first-hand account of her firm’s experience in rolling out her security strategy.
>> Register Now

 Featured News 
Feature News

Focus On Cyber Security provides expert advice on effective network protection

The one-day seminar hosted by Canadian Security presented attendees with some of the tools they require to effectively manage their data and networks, in the form of advice from experts in the field. Attendees heard from experts across public, private and legal spheres and were treated to an insider’s perspective on ethical hacking >> Learn More…


Operational Security Part 5: Online Personas

Security intelligence personnel will need to learn to use VPNs, VMs, DNS spoofing, Tor, and online personas during data collection to maintain anonymity, says Richard B. McEachin >> Read full article

ASIS Toronto announces speaker line-up for Best Practices seminar

The 23rd annual Best Practices Seminar on April 21 will include information on intelligence gathering for critical infrastructure, cheque fraud, mass transit security and threat management in a university setting >> Read full article

Panama document leak exposes offshore accounts

A massive leak of 11.5 million documents from a Panama-based law firm shows the hidden offshore assets of politicians, businesses and celebrities around the world, including 12 current or former heads of state >> Read full article

 Event Calendar 

Border Security Expo

Location: San Antonio, Tex..
Date: April 13, 2016 >> More Info

Security Canada East

Location: Sheraton Laval, Laval, QC
Date: April 20, 2016 >> More Info

ASIS Toronto Chapter 23rd Annual Best Practices Seminar

Location: Markham Event Centre
Date: April 21, 2016 >> More Info

Canadian Technical Security Conference

Location: Cornwall, ON
Date: April 26-28, 2016 >> More Info

Security Canada Alberta

Location: River Cree Resort & Casino, Edmonton, Alberta
Date: May 11, 2016 >> More Info

Port Secure

Location: Toronto, Ont.
Date: May 18, 2016 >> More Info

The World Conference on Disaster Management (WCDM)

Location: Mississauga, Ont.
Date: June 7, 2016 >> More Info