‘Food-Tech’ Fusion Fundraiser with Mariner and Thandi Launches to Benefit United Way Community Fund
Mariner is thrilled to announce the launch of the ‘Food-Tech’ Fusion Fundraiser in celebration of their 20th Anniversary. This unique initiative, in collaboration with Thandi Restaurant, aims to raise $10,000 for the United Way serving Saint John, Kings & Charlotte through the sale of Gerry’s Salad. The funds raised will directly support the United Way’s impactful programs and initiatives, making a tangible difference in our community.
Mariner and Saskatchewan Polytechnic provide change management training
Saskatchewan Polytechnic is excited to partner with industry leader Mariner to offer change management training. These interactive and engaging courses will be of interest to change management practitioners, project managers, human resources and business process professionals who are often asked to participate in or lead change initiatives.
McMaster Continuing Education partners with Mariner to provide virtual courses on Change Management
In today’s changing world, disruption is constant and, as organizations transition to new business solutions and adopt new innovative processes, the demand for professionals to manage and lead these changes is on the rise. To meet this need, McMaster Continuing Education has partnered with Mariner to provide two online, instructor-led training courses on change management.
Mariner celebrates 20 years of impact through innovation
20 years ago Gerry Pond, Curtis Howe and Bob Justason set about a mission to impact the prosperity of Atlantic Canada through technology innovation. From the outset, they had a clear-eyed vision of the kind of organization they wanted to build, even as market offerings were still in development. Mariner’s purpose has always been to be a great, everlasting technology company for people who make an impact.
Security Awareness Training: What It Is and Why You Need It
Security Awareness Training and Education (SATE) is essential for businesses to keep up with the dynamic nature of current cybersecurity threats. We’ll work with you to develop a curriculum that is personalized to your requirements. More important this is a “living” program that you own, with well-defined metrics that continue to show your successes.
Tips to Have a Cyber-Safe Holiday Season
Every time you get an e-mail, text message, or phone call that seems to feel extra urgent, take a pause and think whether it really applies to you. And maybe you can validate that message some other way, instead of clicking on the link provided.
Mariner co-founder Gerry Pond Inaugural Inductee to InnovateNB Hall of Fame
In many ways, the essence of the InnovateNB Hall of Fame is a celebration reflecting a purpose we embrace at Mariner. Who we are and the aspirations we have as an organization for talented people and the communities we serve – to innovate, always and everywhere for change that matters.
Technique of the Week: Accessing Insecure Cloud Storage
Cybersecurity Awareness Month is here and in celebration, the Mariner Vulnerability Assessment and Penetration Testing team are showcasing some of their favorite hacking techniques. Each week in October, they will explain a vulnerability, demonstrate how they might...
Technique of the Week: Bypassing Multi-Factor Authentication in Phishing Attacks
Cybersecurity Awareness Month is here and in celebration, the Mariner Vulnerability Assessment and Penetration Testing team are showcasing some of their favorite hacking techniques. Each week in October, they will explain a vulnerability, demonstrate how they might...
Technique of the Week: Cracking Wireless Networks
Wireless networks are one of the most common avenues threat actors will take to gain access to your internal systems. Once breached, wireless networks often offer attackers a valuable foothold to pivot onto other networks in your organization, jumping from host to host until your entire environment is compromised. This week’s article is going to examine how the 4-way handshake for Wireless Lan (WLAN) communication works, how an attacker might compromise that process, and how to improve your wireless security posture.