McMaster Continuing Education partners with Mariner to provide virtual courses on Change Management

McMaster Continuing Education partners with Mariner to provide virtual courses on Change Management

In today’s changing world, disruption is constant and, as organizations transition to new business solutions and adopt new innovative processes, the demand for professionals to manage and lead these changes is on the rise. To meet this need, McMaster Continuing Education has partnered with Mariner to provide two online, instructor-led training courses on change management.

read more
Mariner celebrates 20 years of impact through innovation

Mariner celebrates 20 years of impact through innovation

20 years ago Gerry Pond, Curtis Howe and Bob Justason set about a mission to impact the prosperity of Atlantic Canada through technology innovation. From the outset, they had a clear-eyed vision of the kind of organization they wanted to build, even as market offerings were still in development. Mariner’s purpose has always been to be a great, everlasting technology company for people who make an impact.

read more
Technique of the Week: Cracking Wireless Networks

Technique of the Week: Cracking Wireless Networks

Wireless networks are one of the most common avenues threat actors will take to gain access to your internal systems. Once breached, wireless networks often offer attackers a valuable foothold to pivot onto other networks in your organization, jumping from host to host until your entire environment is compromised. This week’s article is going to examine how the 4-way handshake for Wireless Lan (WLAN) communication works, how an attacker might compromise that process, and how to improve your wireless security posture.

read more
Technique of the Week: Stealing User Credentials with Open Redirects

Technique of the Week: Stealing User Credentials with Open Redirects

Open redirect vulnerabilities are often viewed as a lower severity class of vulnerability, as they typically aren’t a vector that threat actors can use to attack a web application directly. However, under the right circumstances, threat actors can leverage these seemingly benign open redirects to steal user credentials by introducing an element of social engineering to the mix.

read more

Categories