Slándáil Research:
Feeds
Feeds
Search
Search Engine
Feed: Canada Cyber Centre News
Link
Protecting information while using remote technologies: Tips for academic institutions (ITSAP.00.140)
Protecting information while using remote technologies: Tips for academic institutions - ITSAP.00.140
Cryptographic algorithms for UNCLASSIFIED, PROTECTED A, and PROTECTED B information - ITSP.40.111
Joint guidance for executives and leaders of critical infrastructure organizations on protecting infrastructure and essential functions against PRC cyber activity
Security tips for organizations with remote workers - ITSAP.10.016
Cyber security tips for remote work - ITSAP.10.116
Joint Cyber Security Advisory warns threat actors exploit multiple vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways
Joint cyber security advisory warns that Russian state actors are adapting their tactics to access cloud infrastructure
Defending against distributed denial of service (DDoS) attacks – ITSM.80.110
Website defacement (ITSAP.00.060)
CSE urges the Canadian cyber security community to be vigilant on two-year mark of Russia’s full-scale invasion of Ukraine
Best practices for passphrases and passwords (ITSAP.30.032)
Secure your accounts and devices with multi-factor authentication (ITSAP.30.030)
Password managers: Security tips (ITSAP.30.025)
Instant messaging (ITSAP.00.266)
Top measures to enhance cyber security for small and medium organizations (ITSAP.10.035)
How updates secure your device (ITSAP.10.096)
Joint advisory on PRC state-sponsored actors compromising and maintaining persistent access to U.S. critical infrastructure and joint guidance on identifying and mitigating living off the land
Biometrics - ITSAP.00.019
Cyber security at home and in the office: Secure your devices, computers, and networks (ITSAP.00.007)
Engaging with Artificial Intelligence
The threat from large language model text generators
How to protect your organization from malicious macros (ITSAP.00.200)
How to protect your organization from malicious macros - ITSAP.00.200
Security considerations for QR codes ITSAP.00.141
GeekWeek 9
Practitioner guidance for securing Microsoft Active Directory services in your organization - ITSP.60.100
The case for memory safety roadmaps
CSE and the Cyber release Cyber Threats to Canada’s Democratic Process: 2023 Update
Cyber security advice for political candidates
Campaign teams: Identify and handle malicious messages
Parliamentarians: Know how to manage an account compromise
Parliamentarians: Report social media account impersonation
Cyber threats to elections
Cyber Threats to Canada’s Democratic Process: 2023 update
Loss of control of social media channels
Distributed denial of service attacks - prevention and preparation - ITSAP.80.110
Guidelines for secure AI system development
Guidance for securing Microsoft Active Directory services in your organization - ITSM.60.100
How to shop online safely - ITSAP.00.071
Firewall security considerations - ITSAP.80.039
Shoppers, beware of cyber scams this Black Friday and Cyber Monday, federal partners warn
Domain Name System (DNS) tampering - ITSAP.40.021
Cyber Skills Development
Social engineering – ITSAP.00.166
Cyber Centre statement on a distributed denial of service (DDoS) campaign targeting multiple Canadian sectors
Joint report on new Russian malware campaign targeting Ukrainian military
Cyber Centre releases Baseline Cyber Threat Assessment on Cybercrime with support from RCMP
Profile: TA505 / CL0P ransomware
Profile: ALPHV/BlackCat ransomware
Baseline cyber threat assessment: Cybercrime
Big Dig
Protecting your information and data when using applications- ITSAP.40.200
Joint advisory on the 2022 Top routinely exploited vulnerabilities
Generative artificial intelligence (AI) - ITSAP.00.041
Joint cyber security advisory on Truebot malware
Top 10 IT security actions: No. 3 managing and controlling administrative privileges - ITSM.10.094
Quality manual v4.2
The cyber threat to Canada’s oil and gas sector
CSE urges the Canadian cyber security community to adopt a heightened state of vigilance
Cloud network security zones - ITSP.80.023
GeekWeek 8
CSE and international partners publish a cyber security advisory on LockBit ransomware
Top 10 IT security actions: No. 5 segment and separate information – ITSM.10.092
NIST announces lightweight cryptography selection
Foundational cyber security actions for small organizations - ITSAP.10.300
Best practices for setting up a security operations centre (SOC) - ITSAP.00.500
Steps for effectively deploying multi-factor authentication (MFA) - ITSAP.00.105
CSE and its Canadian Centre for Cyber Security release advisory on People's Republic of China state-sponsored cyber threat
Device security for travel and telework abroad ITSAP.00.188
Device security for travel and telework abroad - ITSAP.00.188
Canadian Common Criteria program requirements and procedures for testing laboratories
Using information technology asset management (ITAM) to enhance cyber security – ITSM.10.004
Joint publication on cyber security best practices for smart cities
Statement from the Minister of National Defence – Cyber Threats to Critical Infrastructure
The Communications Security Establishment (CSE) and Partners issue a joint guide on shifting the balance of cybersecurity risk: Technology product safety
Communications Security Establishment (CSE) and international partners publish joint guide on secure-by-design and -default principles
Defending against data exfiltration threats - ITSM.40.110
A zero trust approach to security architecture - ITSM.10.008
Top 10 IT security actions: No. 9 Isolate web-facing applications - ITSM.10.099
Obsolete products (ITSAP.00.095)
Obsolete products - ITSAP.00.095
Cyber security guide for campaign teams
Satellite communications - ITSAP.80.029
Use of personal social media in the workplace (ITSAP.00.066)
Use of personal social media in the workplace - ITSAP.00.066
CSE urges the Canadian cyber security community to adopt a heightened state of vigilance after one-year mark of Russia’s full-scale invasion of Ukraine
Top 10 IT security actions – No. 7 protect information at the enterprise level - ITSM.10.097
The cyber threat from supply chains
Protecting your organization from software supply chain threats – ITSM.10.071
Cryptocurrency - ITSAP.00.650
Protect how you connect
Connected communities - ITSAP.00.222
Network security logging and monitoring (ITSAP.00.085)
Network security logging and monitoring - ITSAP.00.085
Network security logging and monitoring - ITSAP.80.085
Network security auditing - ITSAP.80.086
Data transfer and upload protection (ITSAP.40.212)
Data transfer and upload protection - ITSAP.40.212
Certifications in the field of cyber security
Course 104: IT security risk management: A lifecycle approach (ITSG-33)
Zero Trust security model - ITSAP.10.008
Federal partners remind Canadian consumers to be vigilant for cyber threats this Black Friday and Cyber Monday
Security considerations for exposure of classified IT systems to mobile devices and wireless signals - ITSB-104
National Cyber Threat Assessments
National Cyber Threat Assessment 2023-2024
An introduction to the cyber threat environment
Choosing the best cyber security solution for your organization - ITSM.10.023
Connected and automated vehicle cyber security for your organization (ITSAP.00.142)
Connected and automated vehicle cyber security for your organization - ITSAP.00.142
Discover Online Safety Workshop - Get Cyber Safe and MediaSmarts
Routers cyber security best practices (ITSAP.80.019)
Routers cyber security best practices - ITSAP.80.019
Cyber Security Awareness Month 2022
Cyber security considerations for 5G networks (ITSAP.80.116)
Cyber security considerations for 5G networks - ITSAP.80.116
Common Criteria
Cryptographic algorithms for UNCLASSIFIED, PROTECTED A, and PROTECTED B Information - ITSP.40.111
Joint cyber security advisory on Iranian Islamic Revolutionary Guard Corps-affiliated cyber actors exploiting vulnerabilities for data extortion and ransom operations
Cyber security career guide
Guest Wi-Fi - ITSAP.80.023
Protect information at the enterprise level - ITSAP.10.097
Identity, Credential, and Access Management (ICAM) - ITSAP.30.018
Top 10 IT security action items: No. 10 Implement application allow lists - ITSM.10.095
Artificial Intelligence - ITSAP.00.040
Don't take the bait: Recognize and avoid phishing attacks - ITSAP.00.101
Executive team
Domain Name Service (DNS) Tampering - ITSAP.40.021
Domain Name Service (DNS) tampering - ITSAP.40.021
Top 10 IT security action items: No.2 patch operating systems and applications - ITSM.10.096
Managing the risks to Government of Canada data when using cloud services - ITSM.50.109
Cyber security hygiene best practices for your organization - ITSAP.10.102
Have you been hacked? - ITSAP.00.015
Protecting your organization against denial of service attacks - ITSAP.80.100
Internet of Things (IoT) Security - ITSAP.00.012
Cyber supply chain: An approach to assessing risk - ITSAP.10.070
How to use online banking securely - ITSAP.00.080
What is voice phishing (vishing)? - ITSAP.00.102
Protect your operational technology (ITSAP.00.051)
Top 10 IT security actions: no3 managing and controlling administrative privileges - ITSM.10.094
Top 10 IT security actions: no.3 managing and controlling administrative privileges - ITSM.10.094
Top 10 IT security actions: No.3 managing and controlling administrative privileges - ITSM.10.094
Protect your organization from malware (ITSAP.00.057)
Cyber threat bulletin: Cyber threat activity related to the Russian invasion of Ukraine
NIST announces post-quantum cryptography selections
Cyber security guidance for heightened threat levels - ITSAP.10.101
Cyber security guidance for heightened threat levels ITSAP.10.101
Cyber*Sci
CSE’s evolved Security Review Program
Quality manual v4.1
Canadian Common Criteria program instructions v1.8
Common criteria
Post-secondary cyber security related programs
Guidance on becoming cryptographically agile (ITSAP.40.018)
Guidance on becoming cryptographically agile - ITSAP.40.018
Joint cyber security advisory on weak security controls and practices routinely exploited for initial access
Industry collaboration
Learning Hub
Academic outreach and engagement
Academic Outreach and Cyber Skills Development
Harmonized TRA Methodology (TRA-1)
Cryptographic Module Validation Program (CMVP)
Canadian Industrial TEMPEST Program (CITP)
Report a cyber incident: Individuals
End user device security for Bring-Your-Own-Device (BYOD) deployment models (ITSM.70.003)
Joint cyber security advisory on protecting against cyber threats to managed service providers and their customers
Spotting malicious email messages (ITSAP.00.100)
About the Cyber Centre
Glossary
Cyber threats and elections
Cyber security precautions – Russian invasion of Ukraine
Joint cybersecurity advisory on 2021 top routinely exploited vulnerabilities
Joint cyber security advisory on 2021 top routinely exploited vulnerabilities
Wi-Fi security (ITSP.80.002)
Cyber security resources for small and medium organizations (ITSAP.00.137)
Security considerations for critical infrastructure (ITSAP.10.100)
Cyber Centre supports U.S. White House call for increased cyber security awareness
Joint cyber security advisory on Russian state-sponsored and criminal cyber threats to critical infrastructure
Certified products
Products in evaluation
Guidance on using tokenization for cloud-based services (ITSP.50.108)
Security considerations for electronic poll book systems (ITSM.10.101)
Protective Domain Name System (ITSAP.40.019)
GeekWeek 7.5
Isolating web-facing applications (ITSAP.10.099)
Application allow list (ITSAP.10.095)
How to identify misinformation, disinformation, and malinformation (ITSAP.00.300)
Report a cyber incident
Use strong user authentication
Privacy Notice Statement
Contact the Cyber Centre
Security in layers with Multi-Factor Authentication
Ransomware: Don’t get locked out
Cyber threat bulletin: Cyber Centre reminds Canadian critical infrastructure operators to raise awareness and take mitigations against known Russian-backed cyber threat activity
Security considerations for your website (ITSM.60.005)
Strategies for protecting web application systems against credential stuffing attacks (ITSP.30.035)
Cyber threat bulletin: Cyber Centre urges Canadian critical infrastructure operators to raise awareness and take mitigations against known Russian-backed cyber threat activity
Securing access controls in a volunteer-based organization (ITSM.30.010)
Ransomware playbook (ITSM.00.099)
Digital footprint (ITSAP.00.133)
Joint cybersecurity advisory on mitigating Log4Shell and other Log4j-related vulnerabilities
Statement from the Minister of National Defence on Apache Vulnerability and Call to Canadian Organizations to Take Urgent Action
Statement on a cyber incident involving the Office of the Secretary of the Governor General
Statement on Active Exploitation of Microsoft Exchange Vulnerabilities
Canadian Centre for Cyber Security releases the Canadian National Cyber Threat Assessment 2020
Launch of Cyber Security Awareness Month 2020
Statement on GCKey credential service and recent credential stuffing attacks
Health sector: protect yourself from cyber threats
Staying cyber-healthy during COVID-19 isolation
Statement on Equifax data breach
Reminder: Cyber security awareness and business continuity best practices
Statement on critical vulnerabilities affecting Microsoft Windows operating systems
Statement on the Capital One data breach
2019 Update on Cyber threats to Canada’s democratic process
Fact sheet for Canadian voters: Online influence activities
Fact sheet for Canadian political campaigns: Protect yourself online
Advisory: Automated phone scams
Statement on the Marriott/Starwood Hotels Data Breach
Fake social media accounts used for phishing
Remembrance Day blog post
CSE’s security review program for 3G/4G/LTE in Canadian telecommunications networks
Cyber security considerations for contracting with managed service providers
Official statement of the Canadian Centre for Cyber Security - Facebook data breach
The Minister of National Defence announces the launch of the Canadian Centre for Cyber Security
New Cyber Security Strategy bolsters cyber safety, innovation and prosperity