Publications

Forensik Conference 2020: call for speakers

Forensik launches a call for speakers for its second edition of the Forensik Conference, which will occur on Tuesday, October 6th, 2020 and will be virtual. Faced with growing cyber threats, this unique event in Quebec dedicated to the management and responses to...

read more

COVID-19: How hackers profit from the pandemic

As we fight the spread of Coronavirus, the number of cyber attacks has been on the rise in recent weeks. And for good reason, cybercriminals are taking advantage of the fear associated with COVID-19 to disseminate false information and encourage users to click on...

read more

Why should you be concerned about Emotet ?

Not sure what Emotet is? Fair enough, you’ve already got enough on your plate. That said, it’s important to know that Emotet is a cybersecurity threat that could jeopardize the resilience of your company. What’s Emotet ?  Emotet is a Trojan horse that hides in your...

read more

Making the most of your tools to manage vulnerabilities

Publications   As you know, vulnerability management is an essential part of an organization’s cybersecurity plan. Although companies recognize the importance of this step, many face a major obstacle: The tools they use to scan their millions of assets have...

read more

Sharing sensitive data securely

Do you ever stop and think about the amount of data circulating around your office? How can you protect your company and manage the vulnerabilities related to this information? Even if you’ve detected the gaps in your own cybersecurity, what about your business partners?

read more

A look at the world of computer forensics

When a client’s IT systems are impacted by a security incident, cyber investigators (or digital forensics investigators) track down the hackers responsible. This profession is still fairly new, but sure to grow as more and more of our day-to-day activities take place in cyberspace.

read more

Building a cybersecurity plan for your company

Today’s pirates have traded gold for data, and rather than sailing the seven seas, they surf the web looking for vulnerabilities. Companies are exposed on several fronts, with no choice but to invest in protection against insidious attacks by cybercriminals. In order to invest wisely, the first step is to detect gaps and assess the cybersecurity risks that threaten your network.

read more