Zero Trust Security: Everything You Need to Know

Whether it’s large-scale breaches of customer information, insecure…

Why Hybrid Cloud Environments Require More Than Just First-Generation IDaaS Solutions

Every organization around the world is on a journey to cloud, each one…

Shift Your Cybersecurity Mindset to Maintain Cyber Resilience

As the business world navigates the ups and downs of today’s economy, a…

It’s Time to Take a Fresh Look at Zero Trust

With millions of employees across the U.S. experimenting with…

Accelerate Your Digital Transformation with Security

In the current competitive landscape, businesses have to face the…

KuppingerCole Report: Leadership Compass of Access Management and Federation

Part of fixing any IT issue is finding the right solution for the…

When Implementing Zero Trust, Context Is Everything

Context is an essential element in everything we do. Context is what…

What Are Insider Threats and How Can You Mitigate Them?

What is an insider threat? Insider threats are users with legitimate…

Darknet Cybersecurity: How Finance Institutions Can Defend Themselves

Financial firms continue to move to digital-first deployments, as…

3 Ways to Supercharge Identity and Access Management

When we talk about identity and access management (IAM), too often the…

52 Key Cybersecurity Tips: Your Playbook for Unrivaled Security

In a world where news spreads fast and online reputation is…

How Employing Encryption for Data Security Changed History

Human history is full of examples of encryption playing pivotal roles in…

Cyber Security Awareness Tips

Helpful tips for helping to keep your identity, personal information and…

24 Essential Penetration Testing Tools

Penetration testing has become an essential part of the security verification…

Ad Hoc or Managed Penetration Testing: Which One Is Best for You?

Penetration testing is no longer an extraordinary security engagement. Due to…

The Modern Workplace: Keeping Remote Workers Productive and Secure

Results from the March 30, 2020, Gartner CFO Survey indicate that 74% of…

Securing Data in a Multicloud Environment

The multicloud environment is becoming the standard for businesses, with 93% of…

Why Adversarial Examples Are Such a Dangerous Threat to Deep Learning

Technologies like artificial intelligence (AI) and neural networks are driven…

DDoS Attacks Increase in Size, Frequency and Duration

Distributed denial of service (DDoS) attacks are increasing in size, frequency…

Build a Roadmap for Cyber Resilience

The current information security landscape is rapidly evolving. According to…

What’s New in the 2020 Cost of a Data Breach Report

In a world of uncertainty and change, it’s a comfort that some things are…

New Ponemon Report: A Programmatic Approach to Vulnerability Management for Hybrid Multicloud

X-Force Red is unveiling a new research study, conducted by the Ponemon…

Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers

The video gaming landscape has changed drastically over the past few decades.…

Protect Your Critical Assets in a Landscape of Expanding Attack Surfaces

Imagine: You just received an alert that threat actors infiltrated your…

Are Current Security Assurance Models Suitable for the Digital World?

With the constantly transforming cyber landscape, intruders are always finding…

Updating Legacy Systems Amid Growing Cybersecurity Concerns

Over the past few months, a shift to remote working has raised many security…

Why Zero-Click Cyberthreats Should Be on Your Radar

For years, the statistics have told us that human error is the greatest…

Digital Transformation: Breaking Down Silos for Better Data Security

Today, enterprises are under pressure to improve the power and reduce the cost…

A Game of Chess: Entropy and Patterns in Threat Intelligence

During a brainstorming discussion with a colleague on the value of entropy in…

A must watch for every penetration tester | Hitesh Choudhary VIDEO

In this amazing youtube video, Hitesh…

The Top 5 Pentesting Tools You Will Ever Need

Introduction There is no doubt today that the…

Rhyno’s Partner Opportunities for Web Developers and IT Professionals

Rhyno delivers next-generation, fully-managed…

Malware

All about malware You know how every year the medical community campaigns for…

Millions of WordPress accounts targeted in major cyberattack

Attackers exploited XSS vulnerabilities in WordPress themes and plugins to…

China Harnesses Taidoor Malware for Remote Access Attacks, DHS, Warns.

The Chinese government is leveraging TAIDOOR malware to launch remote access…

Top 10 online scams: Watch out for these common red flags

Scams aren’t new; they’ve been around for centuries, even millennia. They are…

Protect yourself from the cyber attacks

More frequent reports of data breaches, malware and other cybercrime is…

Fear Makes Cybercrime More Likely: Gartner

More frequent reports of data breaches, malware and other cybercrime is…

What Is Data Privacy and Why Is it Important?

Data privacy has always been important. It’s why people put locks on filing…

Clickjacking – What Is It and How To Defend Yourself

In a clickjacking attack, the user is tricked into interacting with a UI…

4 Cybersecurity Career Paths (And the Training to Get You There)

Cybersecurity professionals work in every size company and industry to protect…

Wireless Penetration Testing: What You Should Understand

Wireless is here to stay and becoming more and more pervasive. Understanding…

What is a firewall and do you need one?

A firewall is a security device — computer hardware or software — that…

How to protect yourself from cyberattacks when working from home during COVID-19

As many companies adopt work-from-home policies in response to the…

8 Steps to Protect your Website

In a guest post from Linda Firth, she explains 8 ways that you can help…

Twitter’s massive attack: What we know after Apple, Biden, Obama, Musk, and others tweeted a bitcoin scam

The Twitter accounts of major companies and individuals were compromised…

Six Tips for Keeping Your Employees and Operations Safe

Just when we thought our COVID-19 anxieties couldn’t reach a higher peak,…

UNDERSTANDING FAKE SEXTORTION EMAIL SCAMS

There are numerous reports about an email scam where the scammer falsely…

Phishing: The Cyber-Scam That Can Take Everything Away From You

According to the Office for National Statistics (ONS), one in ten people in…

THE MOST COMMON INTERNET SCAMS YOU CAN’T HELP BUT SPOT

The most common Internet scams you can’t help but spot, and a few that are…

Why are Secure Passwords and Authentication Tools Necessary

We live in a password-driven society, where the ability to access various…

Cybersecurity and cyber resilience – security and cybercrime

Cybercrime and cyberattacks continue to rise with ever more data breaches…

Top 10 Most Common Types of Cyber Attacks

A cyber attack is any type of offensive action that targets computer…

27 Top Cybersecurity Tools for 2020

27 Top Cybersecurity Tools for 2020 We list and describe the top…

10 Ways to Prevent Cyber Attacks

High-profile cyber attacks on companies such as Target and Sears have raised…

How To Identify A Cyber Attack and 25 Things You Can Do To Recover

A cyber attack often sounds like something out of a Hollywood heist film.…

15 Alarming Cyber Security Facts and Stats

The cybersecurity industry is rapidly growing every day. Although more…

Data Privacy vs. Data Security [definitions and comparisons]

When it comes to data privacy vs. data security, we can frequently hear or…

Data Privacy: What You Need to Know and How to Get Started

Data privacy is a huge public concern of the digital age, in part because…

5 TIPS FOR BETTER CYBER SECURITY IN THE WORKPLACE

The temptation to cut corners where correct cybersecurity practices are…

8 Smart Ways to Protect Your Personal Data

The data breach at credit reporting agency Equifax affected 143 million…

10 of the Most Common Security Breaches You Need to Be Aware Of

In 2016, search engine and email giant organization Yahoo had their system…

Microsoft releases emergency update to fix two serious Windows flaws

Microsoft on Tuesday released emergency security patches to plug a pair of…

THE FIVE TYPES OF FIREWALL ARCHITECTURE

In its most basic sense, a firewall exists to prevent unwanted access to your…

10 Fun Facts About Canada Day

The Canada Day long weekend is finally here. With the fireworks scheduled…

Web Developer

We have an exciting career opportunity for a WordPress Web Developer to join…

52% of users reuse their passwords

Most Internet users these days still haven’t fully understood the importance of…

Business Development Specialist

Welcome to the world of Cybersecurity Locations: Ottawa, Kitchener Looking for…

What are White Hat Hackers?

Contrary to popular belief, not all hackers are malicious. Hackers use their…

Steps for Safe Computing and Online Privacy

Top 10 tips for safe computing and online privacy Protect your personal…

How to tell if an email is malicious or genuine

Safety deposit boxes for our valuables, security systems for our homes,…

How To Create Secure Passwords You Won’t Forget

Safety deposit boxes for our valuables, security systems for our homes,…

Cybersecurity Tips to Keep Your Data Safe While Traveling

During your travels, it is easy to become so preoccupied with sharing your…

12 Simple Things You Can Do to Be More Secure Online

If a major shopping or financial site suffers a data breach, there’s not…

The Top 10 Ways Hackers Get Around Your Firewall And Anti-Virus To Rob You Blind

Are You A Sitting Duck? You, the CEO of a small business, are under attack.…

How to hire a white hat hacker: 8 tips to lift your application security game

What with ingenious data thieves and sloppy users, penetration testing is a…

Top 10 online scams: Watch out for these common red flags

Scams aren’t new; they’ve been around for centuries, even millennia. They are…

Best InfoSec and Cybersecurity Certifications of 2020

10 Hot Cybersecurity Certifications For IT Professionals To Pursue In 2020 IT…

6 Steps for Preventing and Cleaning Up Cyberattacks

Districts face an intimidating array of…

Corona Virus (COVID-19): Staying Strong, Staying Connected

Life is a series of peaks and valleys.…

Cybersecurity and Sharing Data Across The Enterprise

Data is born in silos but is most valuable when shared across multiple…

BYOD Becomes More Strictly Policed in 2020

Bring Your Own Device (BYOD) has been a significant source of cybersecurity…

Implementing cybersecurity at the beginning – Not at the end!

Another cybersecurity trend for 2020 is the realization that organizations…

Zero-Trust Model Predicted to Continue to Evolve In 2020

‘Zero Trust’ refers to a cybersecurity defence model that refuses trust to any…

Increases in Supply Chain Attacks Predicted for 2020

The supply chain is one of the leading cybersecurity threats that CEOs, IT…

The Impact of Internet of Things on Cybersecurity

Consumers and businesses must be wary of their cybersecurity when it comes to…

Introducing Fully-Managed, High-Speed, Secure Hosting for Agencies

Whenever I talk to agency partners I ask them about the latest developments in…

How to Protect Your Business When Selling Online in 2020

You need to be wary of fraudulent purchases when you’re selling online – your…

Top 10 Cybersecurity Tips for the Holidays Season

The holiday season is fast approaching, and individuals and businesses alike…

Rhyno’s Message on CBC Radio’s Sounds of the Season about Cybersecurity Awareness for this Holiday Season

Dan Duran of Rhyno Cybersecurity, resplendent in a Super Mario Christmas…

Cybersecurity Attacks Can Happen Everywhere – Cybersecurity Expert Warns.

This is the message that our CTO, Dan Duran, is trying to get across after…

How to protect your personal info from hackers on your Mac – Cybersecurity Tips

As soon as you’re connected to the Internet, applications can potentially send…

What you need to know about Canada’s cybersecurity business landscape

Did you know that more than 54% of impacted businesses in Canada report that…

Don’t Get Spoofed! – A lesson on Password Spoofing

What is Password Spoofing? Password Spoofing also-known-as login spoofing is…

October is Cyber Security Awareness Month in Canada

October is Cyber Security Awareness Month in Canada…

Live Interactive Threat Map

Look at this and you will be amazed! A cyber attack map is just a fancy,…

How SELECT code_execution FROM * USING SQLite; can ruin your site.

Cyber attack that cost Stratford city hall $75K ransom should be wake-up call: Expert

Cyber attack that cost Stratford city hall $75K ransom should be wake-up…

Project Analyst – Online & Mobile Software

We have an exciting career opportunity for a Project Analyst to join our team…

Account Manager

We have an exciting career opportunity for an Account Manager to join our team……