Technique of the Week: SQL Code Injection
SQL Injection, also known simply by SQLi, is likely one of the most discussed and well-known attacks to applications, even more so in the context of web applications. Even though it was first publicly discussed late 1990s (Phrack Magazine #54), SQLi is quite often misunderstood and still present in applications today.
Technique of the Week: Stealing User Credentials with Open Redirects
Open redirect vulnerabilities are often viewed as a lower severity class of vulnerability, as they typically aren’t a vector that threat actors can use to attack a web application directly. However, under the right circumstances, threat actors can leverage these seemingly benign open redirects to steal user credentials by introducing an element of social engineering to the mix.
NSBI supports Mariner in local job creation
Halifax, Nova Scotia - Nova Scotia Business Inc. (NSBI) has approved a business development incentive in the form of a payroll rebate for Mariner Partners Inc., a wholly owned subsidiary of Mariner Group Inc. Founded in New Brunswick in 2003, Mariner is a technology...
Cybersecurity Fundamentals: What is an OWASP MASVS Assessment?
One of the most common instances in which you might want an OWASP MASVS assessment is when you are developing a commercial mobile application. The results of a MASVS assessment can be used to show potential users and auditors how your application stacks up against a universally accepted standard.
Enterprise Change Management – Build & Integrate the Approach to Embrace Change
Disruption is now constant across every industry, with the pace of change accelerating. It has been said that in the next 10 years we will see more change than we’ve seen in the last 100 years. In the past, organizations typically contracted Change Management...
Supply Chain Cybersecurity: A Maritime Perspective
Don't forget to check out part one of our supply chain cybersecurity series on positioning your organization appropriately to deal with the challenges and part two on focusing your cybersecurity efforts. We live in an age of uncertainty and rapid technological...
Supply Chain Cybersecurity: Focus Your Efforts
Here's part two of our three-part series on supply chain cybersecurity. Be sure to check out part one on positioning your organization appropriately to deal with this challenge. And next week we'll explore the particularly complex Maritime industry. Companies...
Supply Chain Cybersecurity: Are You in Position?
Welcome to part one of our three-part series on supply chain cybersecurity. We’ll explore recent developments impacting the delivery of goods and services as well as how to focus your efforts to ensure ongoing cybersecurity within your logistics network. We will also...
4 Benefits of Strong IT Asset Management
Poor IT Asset Management can be costly in terms of service availability, revenue, and reputation. The cybersecurity posture of a business can also be weakened.
Cybersecurity Fundamentals: Security vs. Usability and Paving the Path of Least Resistance
While it is true cybersecurity will always require some level of cooperation and engagement from end-users, the standards, and procedures designed to protect your organization should never be overbearing to a fault.