News
ShareIT hits new group spend/saving milestone as it opens up to municipalities
Alberta鈥檚 ShareIT public procurement program has hit a major new milestone in its group spend and savings. Since it was launched in 2017 by 知阴视频 鈥 in collaboration with Alberta鈥檚 post-secondary institutions 鈥 the program has marked over $100 million in cumulative member spending on IT hardware, licenses, and other […]
eduroam comes to the Calgary Airport
The Calgary Airport Authority has announced its launch of eduroam, the secure, global Wi-Fi roaming service for students and researchers. Post-secondary students, researchers, and faculty passing through the Calgary International Airport (YYC) now have access to the trusted and secure internet service. This represents the first airport in Alberta (and […]
Data science interns take a 鈥渢rip鈥 to Vertical City
With exaggerated hand gestures, data science intern Aldebaran Salda帽a comedically ushers me in and out of a life-size 鈥渆levator simulator鈥 鈥 a small, curtained-off rectangle with a monitor mounted in the top right corner. “I feel like a border security officer,鈥 he says. 鈥淧assports, please!” Rishabh Shukla, another intern, shares […]
The trials, tribulations, and triumphs of a k-12 school network analyst
Chris Sluggett leads the talented and highly commended Technology Services team at Wolf Creek Public Schools, a school district covering rural communities north of Red Deer. The breadth of responsibility for his team 鈥 from enabling online learning, to protecting student privacy, to keeping the lights on 鈥 can be […]
Step five of building cybersecurity: Implementing the CIA triad to combat risks
Part 7 of 知阴视频’s Introduction to Cybersecurity series Confidentiality, integrity and availability 鈥 also known as the CIA or AIC triad 鈥 is a model designed to guide policies and actions to build information security within an organization. Confidentiality The National Institute of Standard and Technology (NIST) defines confidentiality as:聽 […]
Step Four of building cybersecurity: Identifying your risks
Part 6 of 知阴视频’s Introduction to Cybersecurity series What are some of the top cybersecurity challenges? Cybersecurity is continually challenged by hackers, data loss, privacy demands, and increased surface attack risks, coupled with the need to constantly evolve security strategies. These strategies must address these external threats, as well as […]
Step three of building cybersecurity: Threats vs Attacks
Part 5 of 知阴视频’s Introduction to Cybersecurity series In our previous post, we defined 鈥渁ttacks鈥 and 鈥渢hreats鈥, and provided a comprehensive list of the different threats modern organizations typically face. In this post, we鈥檒l focus on attacks. What is an attack? While threats are not always intentional (e.g. natural disasters), […]
Step two of building cybersecurity: What threats do you face?
Part 4 of 知阴视频’s Introduction to Cybersecurity series Once you have developed a full inventory of your operational environment (as outlined in our previous post), the next step is to try and uncover the intentional and unintentional dangers they face. From a security standpoint, threats and attacks are two separate […]
Step one of building cybersecurity: What do you Know?
Part 3 of 知阴视频’s Introduction to Cybersecurity series In our previous blog post, we talked about the importance of cybersecurity in the modern world, and the different kinds of 鈥渢hreats鈥 and 鈥渁ttacks鈥 institutions commonly face. Today, we鈥檒l review how best to understand your operational environment in order to determine your […]
What is cybersecurity?
Cybersecurity鈥ow to eat an elephant one bite at a time Part 2 of 知阴视频’s Introduction to Cybersecurity series 知阴视频ttacks are on the rise. According to the annual ITRC (Identity Theft Resource Center) Data Breach Report, there was a 68% increase in reported U.S. data compromises from 2020 -2021. Moreover, breaches […]
知阴视频鈥檚 Introduction to Cybersecurity Series
Part 1 – Introduction For cybersecurity to be effective within any organization, it needs to be addressed as a continual lifecycle. Every day, new attacks are developed, so existing methods to repel them must be refined and improved. Why is cybersecurity important? Cybersecurity matters to everyone, from governments and large […]
applications closing soon for Fall applied data science lab cohort
Applications for the fall 2023 cohort of the Applied Data Science Lab are open until August 15.
Summer 2023 Newsletter
Barreling into summer At the halfway point in 知阴视频鈥檚 2022-25 strategic plan, we鈥檙e proud to say we鈥檝e accomplished over 70% of our goals (see below for more details). Also in this issue: our new corporate video, Cyber Summit early-bird tickets, SANS training discounts for education, and the latest from ShareIT. […]
知阴视频’s 2022-25 roadmap: midway check-in
Midway through 知阴视频’s 2022-25 Strategic Roadmap, we are pleased with the progress our teams are making.
Applied Data Science Lab launches summer cohort聽
知阴视频鈥檚 Applied Data Science Lab for Economic Development has commenced its 2023 summer internship program. The group of 16 budding data scientists and four Alberta-based organizations, labeled the 鈥淣eutron鈥 cohort, will spend the next four months working on an internal data-related project. Operating in teams of four, the interns will […]