When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
It was recently found out that the majority of malware downloads came from cloud applications in 2021. Indeed, a study…
DDoS attacks with ransom demands are growing significantly
It was recently found out that distributed denial-of-service (DDoS) attacks with threats of extortion are rising significantly. Indeed, more and…
DevOps adoption to continue growing in the coming years
The DevOps Industry is expected to continue growing with the rise in digital businesses and the spread of digitalization among…
Amazon Web Services to be a part of prpl Foundation
It was recently announced that Amazon Web Services (AWS) would be joining the board of prpl Foundation. The foundation hopes…
Counties in New Mexico and Arkansas victims of ransomware attacks
It was recently reported that two counties in New Mexico and Arkansas have been victims of ransomware attacks that affected…
CN and Google Cloud to partner to modernize services
It was recently announced that CN and Google Cloud will be entering a seven-year strategic partnership to improve CN’s supply…
Montreal’s tourism agency to have been hit by cyber attack
It was recently reported that Montreal’s tourism agency was the victim of a cyber attack last month by the Karakurt…
Canadian websites to have shut down completely following log4j2 vulnerability
Canadian websites have temporarily shut down over the weekend in order to deal with the log4j2 vulnerability. Indeed, it was…
Log4j software flaw to be considered most severe in history
The Log4j software flaws are considered one of the most dangerous flaws in recent history. Indeed, major companies are rushing…
Digital businesses transformation to be driving the adoption of APIs
It was recently found out that digital business transformation initiatives have led to an increase in reliance on external-facing APIs.…
White Papers
No results found.