Eric Jacksch
PRESTO? Not really
Implementing a card-based transit payment system is no small feat. High volumes, small transaction values, mobile fare payment devices, and…
Exerting external influence
The dramatic growth of social media during the last decade, combined with a serious decline in both the quality and…
Parliament Hill: The balancing Act
My opening statement outlined the situation and potential cybersecurity concerns: In December 2011, then Prime Minister Harper and President Obama…
Zello: A revolutionary tool
In aftermath of Hurricane Harvey, volunteer rescue organizations mobilized to aid fellow citizens. The Cajun Navy, a volunteer group comprised…
Common Criteria for IoT?
The memo, which also confirms that the Army has issued over 300 Airworthiness Releases for DJI products, instructed members to,…
Snap Geolocation
With 60 per cent of users under 25 years of age, according to Statista, and another 26 per cent between…
Report: Cyber Threats to Canada’s Democratic Process
The CSE report, Cyber Threats to Canada’s Democratic Process, highlights three aspects of the democratic process that are likely to…
Blaming the Internet
“We cannot allow this ideology the safe space it needs to breed,” reads the statement on her Facebook Page, “Yet…
Help defeat ransomware
Operating system improvements Operating systems must become more malware resistant. Microsoft has significantly improved Windows over the last decade. Modern…
Shameless opportunism
Outside the cybersecurity realm, sales and marketing professionals display significantly more tact. Following serious highway pileups, automobile manufacturers do not…
Reviews
SAMSUNG GALAXY S8 PLUS
The Samsung Galaxy S8 Plus is a beautifully crafted smartphone with nearly no bezel, curvaceous in design and reflects a…
How to: Connect to Exchange Online Using Multi-Factor Authentication
Using PowerShell to manage your Microsoft cloud services like Exchange Online and using multi-factor authentication (MFA) separately is awesome. Using…
Stay connected