Cybersecurity Blog
Thought leadership. Threat analysis. Cybersecurity news and alerts.
Counting the Cost of a Cyber Attack: Litigation CostIn the last 12 months, Canada has seen high-profile data breach class action lawsuit settlements. These data breach lawsuit settlements highlight the added cost of a cyber attack: cost of defense and a judgment or settlement.Case #1: Lozanski v. The Home Depot
The Lozanski v. The Home Depot case rose from the data breach at Home Depot of Canada between the period of April 11, 2014 and September 13, 2014. Between this period, Home Depot’s payment card system was hacked by criminal intruders using custom-built malicious software.
After detecting the data breach on September 9, 2014, Home Depot notified the Office of the Privacy Commissioner of Canada, the Office of the Information and Privacy Commissioner of Alberta, the Office of the Information and Privacy Commissioner of British Columbia and the Commission d'accès à l'information du Québec about the data breach. On September 16, 2014, Home Depot published notices of the data breach in The Globe and Mail and in La Presse. In the newspaper notices, the company confirmed the data breach. In the said newspaper notices, the company announced that it eliminated the malicious software that was responsible for the data breach. It also announced in the same newspaper notices that customers affected by the data breach will get free credit monitoring and identity theft insurance. On September 21, 2014, Home Depot emailed its more than 500,000 Canadian customers, notifying them that payment card information of some customers might have been compromised. On November 6, 2014, the company also emailed 58,605 Canadian customers, advising them that their email addresses may have been stolen in the data breach. A class action was filed against Home Depot as a result of the data breach. On April 25, 2016, the parties signed a settlement agreement. The agreement specifies two major points: 1) Home Depot denies any wrongdoing; and 2) The class action members will release their claims against Home Depot. On August 29, 2016, Justice Perell of the Ontario Superior Court of Justice approved the Home Depot settlement agreement, awarding the data breach victims the total amount of $400,000 and approving the counsel fee of $120,000 despite the following findings: “The case for Home Depot being culpable was speculative at the outset and ultimately the case was proven to be very weak. The real villains in the piece were the computer hackers, who stole the data. After the data breach was discovered, there was no cover up, and Home Depot responded as a good corporate citizen to remedy the data breach. There is no reason to think that it needed or was deserving of behavior modification.” Case #2: Drew v. Walmart Canada
Ms. Drew in the Drew v. Walmart Canada case was a client of Walmart’s online photo center website. She provided Walmart’s photo center website her name, address, telephone number and credit card information.
On July 15, 2015 and October 30, 2015, Walmart informed Ms. Drew via email that “third parties” were able to access Walmart’s customers’ personal and financial information. As a result of the data breach, Ms. Drew initiated a class action against Walmart. While Walmart made no admission of liability, in a settlement agreement, it agreed to the following:
Justice Perell of the Ontario Superior Court of Justice in the decision dated May 30, 2017 approved the above-mentioned costs that Walmart agreed to shoulder in the settlement agreement. Landmark Case: Jones v. Tsige
While the Jones v. Tsige can’t be categorized as a high profile case, the ruling of this case may have sparked other litigation cases as a result of invasions of privacy. The Jones v. Tsige case, decided by the Ontario Court of Appeal in 2012, resulted in “a number of awards have been made in other cases based on common law and statutory tort claims for invasions of privacy, including situations where there was no economic harm,” lawyer Alex Cameron said in the article "Cybersecurity in Canada: Trends and Legal Risks 2017” published on the Ontario Bar Association website.
In the Jones v. Tsige case, the defendant used her workplace computer to access at least 174 times the private banking records of her spouse's ex-wife. The Ontario Court of Appeal ruled that even if the dependent didn’t publish, distribute or record the private banking records, she’s still liable for “moral” damages amounting to $10,000. “The defendant committed the tort of intrusion upon seclusion when she repeatedly examined the plaintiff's private bank records,” Ontario Court of Appeal said. “Proof of harm to a recognized economic interest is not an element of the cause of action.” Imran Ahmad, partner at Miller Thomson LLP, in the paper “Cybersecurity in Canada: What to Expect in 2017” (PDF) wrote, “At common law, Canadian courts, recognizing the rapid pace at which technology is evolving, have been receptive to recognizing new torts advanced resulting in cybersecurity and privacy breaches (e.g., intrusion upon seclusion, disclosure of private facts, etc.) that are being advanced by plaintiffs’ counsel.” Imran added, “We anticipate this trend to continue and to see the existing torts being further tested by the courts.” Cases under Canada’s Digital Privacy Act
According to privacy lawyers David Fraser and David Wallace, violations under the Digital Privacy Act “once they take effect, can lead to quasi-criminal liability (it’s not a criminal offence but it’s subject to a penalty that’s similar to a criminal offence, although the court procedures are less complicated) for both organizations and for directors personally.”
The Digital Privacy Act amends Canada’s Personal Information and Protection of Electronic Documents Act (PIPEDA). Under the Digital Privacy Act, Canadian organizations are required to notify individuals and organizations of all breaches of security safeguards that create a “real risk of significant harm” and to report the incident to the Office of the Privacy Commissioner of Canada. 5 Ways a Cyber Security Consultant Can Help Your BusinessBusinesses are constantly burdened with the risk of security breeches. Learn how working with a cyber security consultant can alleviate those headaches.Think only large corporations get targeted? Think again. In 43% of cyber security events, a small business was actually targeted. In the event of a cyber attack, your small to medium sized business (SME) could experience multi-million dollar losses in financial, operational and data breaches, as well as, reputation damage. The average SME -- even one with insurance -- would take quite a blow from this type of attack. A cyber security consultant can help you both prevent attacks and better manage attacks that occur to protect you and your customers. Let's explore how. Supplementing In-House CapabilitiesThe skill and scope of cyber attacks is ever-increasing. Even organized crime is getting in on the action. As regulators work to keep pace with burgeoning events, even a dedicated department, team or individual may struggle to keep up. They may be bogged down with operations. A cyber security consultant stays up-to-date. They can get a panoramic view of your organization and its vulnerabilities. They can help keep your business safer. Preventing AttacksA cyber security consultant will go in depth to identify weaknesses in your systems and processes. Have you safely integrated cloud storage into your systems? How strong are your encryptions? Can transferred data be intercepted? And potentially the most elusive of all must be addressed. How are you protecting yourself in the event of inevitable human error? Despite your best efforts to keep systems secure, could you see any of these scenarios happening in your organization? Someone:
A consultant can help you prevent attacks, including those that result from human error or ill-intent. Mitigating DamageData breaches happen. This may be the last thing you want to hear a consultant say. But we'd be dishonest if we said otherwise. And we're not telling you anything that you don't know already. The difference between $10 thousand in losses and $200 million is largely based on how your organization has invested in the risk management of security breaches. Through risk management you can put systems in place to spot an attack sooner and limit its scope. Without a consultant, you may not be doing all you should to mitigate damage. Protecting CustomersCyber security consultants help you protect your customers/clients. Without them, you don't have a business. By taking the additional steps of bringing in cyber security consultants, you demonstrate that you care about protecting those who've helped you become what you are today. That's good for business and your customers. Crisis ManagementCyber security consultants know how to handle the heat of an event. They're accessible and ready to help you execute your plan to mitigate damage, comply with regulation and keep your company safe. Get the Right Cyber Security ConsultantA consultant will help you fill in the gaps in your own security plan and develop a plan to both prevent attacks and reduce damage. For more information on how our cyber security consultants can help your company, contact us today.
How to Choose the Ideal Cyber Security CompanyLooking for a cyber security company? Protecting your business in not a luxury, it's a necessity. 2016 saw more cyber security breaches than any other year on record. In fact, according to the Identity Theft Resource Center (ITRC), 1,093 attacks occurred that year--up 40% from the year before. The ITRC reports that most of the data breaches were the result of email compromise schemes. The second most common type of breach was the result of accidental email or internet exposure of information--employee errors. Are You Protected?The Financial Post reports that about 36% of Canadian IT professionals know their companies have experienced a security breach. Many breaches go undetected and reporting them is critical to your company's future. These breaches can harm not only the business that's been attacked but the clients that are served by the businesses. An attack has many costs, and one of them is the trust a client puts in you--you may lose that trust and it'll cost you. Is your company putting its clients and customers at risk for identity theft? If your answer is maybe, read the easy guidelines below that will help you find a cyber security that will meet your company's needs. Finding the Right Cyber Security CompanyEnsure that the company you hire bases its work on the three pillars of cyber security: people, processes, and technology. PeopleWithin you company, everyone should receive proper training about how to avoid making your network vulnerable. At the company you hire, the employees should strive to keep up to date with the most current threats and the technology to thwart them. ProcessYour organization must have standards in place that operate as the rules for how to avoid a cyber attack. These standards should be managed by an information security management system that can be put in place by your own technicians or by the cyber security company you hire. TechnologyThe technology you employ must be up to date to counter current threats. This should include malware protection, secure mobile and web use for employees, network security, and secure configurations. Conflict of InterestEnsure that the firm you want to hire doesn't have a relationship with hardware or software companies that might keep them from having your best interests at heart. Hopefully, you can find a firm that has developed its own technology and isn't relying on someone else. Going along with the idea of having your best interests at heart, can the firm you're considering tailor their services to your business? Or do they only do one thing for everyone who hires them? Are They Insured?Did you know that cyber security companies should carry insurance just like any other contractor you hire? Who Else has Hired Them?Find out what other companies trust the firm you're considering. Are some private, some public? Are some commercial and some government? You want someone who has represented a variety of businesses so that you can benefit from what the firm has learned in dealing with a range of issues your own company may or may not encounter. In other words, you want the firm you hire to be prepared for anything that may come your way. What to doIf what you've read has come as news to you, consider finding help. Your business is on the line and the trust your clients and customers place in you is at stake. Act today.
Why North America is Behind in Cyber Security WorkforceIt does probably not come as a surprise to you, that there is a severe shortage in the cyber security workforce. Especially in North America. According to the Indeed Spotlight: The Global Cybersecurity Job Gap, the US is ranked 4th in the world for employer demand for cyber security talent. The Indeed article also tells us that specifically, network security specialists are in high demand. This is the skill set that is most desired by employers on a global level. Although this news may not be a surprise, you're probably asking yourself, why is it so. Why's there a Skills Gap in the Cyber security Workforce in North America?The why of the skills gap in the cyber sector dates back to why the internet was created in the first place. As stated in the Fraser Institute's Cybersecurity challenges for Canada and the United States, "The Internet was designed not with security in mind, but rather an openness and the free flow of information." Cybersecurity wasn't considered much until recent years. It wasn't until governments corporations, individuals, and the like became to realize the importance of protecting cyberspace. As so the challenge of how to protect the internet without hindering the freedom it represents was created. The reason North America is behind other countries when it comes to the cyber security workforce boils down to job seeker interest. Many employers are looking to hire those with advanced degrees and specializations in cyber security. And there are simply not enough of these employees to go around. Cyber security is not an easy job.Another reason for the gap in the cyber security industry is it's not a pleasant topic to think about. No one wants to discuss hacking, just as no one wants to discuss what happens in a case of a fire. It's one of those topics that no one does anything about because they don't think it's going to happen to them. Until it does. This brings to light two imperative topics all companies should consider, and they are The Importance of Cybersecurity Programs and Are the Biggest Cyber Security Risks your Employees. These two topics should no longer be avoided, as the trend for cyber criminal activity continues to rise. Companies need to stay up to date with all of their security measures. What can be done about the Cyber security Workforce Gap:A few options as expressed in a csoonline.com are:
In order to close the cyber security gap in the North American workforce, it's best to implement automated security solutions. This will help relieve the pressure until IT workers can be cross-trained or the interest in the sector picks up. Once the interest in the cyber security industry picks up it'll make it much easier to hire the appropriate staff.
5/15/2017 4 Tips for Better API Security4 Tips for Better API SecurityApplication Programming Interfaces (APIs) are everywhere, making life easier for consumers and companies on a global scale. Without API’s the digital economy would surely disintegrate. Thanks to API’s, sharing data between applications and legitimate developers has become easier than ever before. So has the risk of unintentionally sharing information with hackers. According to the Identity Theft Resource Center, there have been over 7000 network security breaches since 2005, involving 1000s of data records. A breach in your API security can have devastating effects on your business, damaging your reputation and your profits. These 4 security tips can help you save your business. 1. Be Vigilant from the StartFocus on your mobile app’s software security from the first line of code. Vulnerabilities in your source code could filter through to your API and beyond, especially in the case of native apps that are downloaded to the client’s device. Test and re-test your app code for weaknesses before putting it out there. Then protect it with the best encryption you can find and back that up with API encryption. Keep the client’s needs in mind. Don’t compromise on performance and user experience with heavy-handed security measures. 2. Make SSL/TLS the Rule for All APIsSecure network connections at the back end are vital. All servers and cloud servers that are accessing an app’s APIs should have security in place to guard against unauthorized data access. SSL/TLS are the building blocks of secure systems – use them, everywhere. Plus, you get the added SEO benefits that Google dishes out to SSL sites. SSL is your most effective protection against man-in-the-middle attacks. Add a VPN to that and you should be okay. Conduct a vulnerability assessment of your network to reveal weaknesses in your data protection methods. 3. Install Meticulous Identification, Authentication and Authorization ProceduresYour first line of defense in protecting your data is a gatekeeper to separate friend from foe. The use of identification, authentication and authorization technology will do just that and is vital for your legitimate users to prove who they are when accessing your app. OAuth2 has become the leading protocol for API security by managing connections securely with one-time tokens. You can configure and customize this framework to suit your needs. Likewise, OpenID Connect is a made-for-mobile protocol that assigns an ID token to your users, eliminating the need for cross-questioning them more than once with repeated sign-ins. 4. Don’t DIY When it Comes to API SecuritySave yourself the risk, expense, and effort of creating your own API security structure. Excellent security systems already exist for API’s - learn to use them. Putting your security systems in the hands of an expert is often the safest bet. Especially when it comes to protecting yours and your client’s sensitive data. API security cannot be overemphasized, make yours a priority so that you too can reap the benefits of modern technology to the best advantage. Talk to us, we can help you today.
How A Cyber Attack Can Cost Your Company Money2016 was a record year for data breaches. There were 1,093 data breaches in the United States in 2016. That's a 40% increase from the year before. And spending is up in security related software, services, and hardware. "But that wasn't you," you say. "I've got the best cyber security in town." That may be true. But it doesn't mean it can't happen to you. Some of the largest companies in the world with deep pockets for world class security have experienced cyber attacks. And you don't think it could happen to you? Today we're going to look at how a cyber attack could affect your company today. What Kinds Of Costs Are Involved In A Cyber Attack?After a cyber attack, there are monetary costs, of course, to a business. And this can be the main focus. There are indirect and direct monetary costs that could occur. And some of these costs might be hidden from you at the outset. Direct CostsOnce a data breach happens, there are legal consequences. You will need to hire a lawyer if you don't have one to mitigate the legal repercussions. You will have to shore up the breach and hire more IT professionals to do so. You might need other consultants and even a physical security team if the breach happened because of a physical breach of property. You will have the direct cost of lost customers due to personal information being stolen or the cost of reimbursing customers for the cost of damage done through malware. The cost of downtime could go up to $300k per hour or $5,600 per minute if you have a large enough clientele. Indirect CostsThere might be some indirect costs after a cyber attack. You might have some additional training to do with employees, which means overtime or lost productivity. You will probably have to fire and hire security personnel depending on the situation. And you will have to upgrade security systems, of course. Some Costs Aren't MonetaryThe trust people had in your company may be damaged. Some customers may not stay with you. Once that trust is broken, it will take time and lots of positive experiences to repair the damage. Some payment companies such as credit cards may refuse to work with you if the breach affected their customers. This will remove payment options for your customers and you may lose customers in this way as well. You Are Not Immune, Small Business OwnersIt's well known that small fish are easier to catch. And if you think about it, being able to quickly snap up thousands of small bits of information could actually be more profitable for a criminal than spending the money and time and effort to hack a large corporation. Plus, they are probably more likely to be caught if they attack a large company with better security. In fact, attack 1000 small businesses and you've got the $300,000 of a large corporation breach. That's $38,000 on average that an attacker makes in a small business data breach. So, if you want to know more about stopping cyber attacks before they happen, reach out and talk to us. We're here to help.
5 Major Cybersecurity Predictions for 2017Cybersecurity poses one of the biggest issues for business leaders today. In fact, between December 2015 and December 2016, 51 percent of adults suffered from some kind of security incident. Due to the increasing prevalence of cybersecurity attacks, it is no longer prudent to take reactionary measures after a cyber attack has occurred. Proactive steps must be taken in order to ensure security. Luckily, more and more businesses are coming to terms with this necessary reality. Unfortunately, many organizations' proactive defense strategies have already been outgrown by the ever prevailing and rapidly evolving cyberattack community. Thinking in the present isn't enough- businesses need to stay two steps ahead of cyber attackers at all times. In order to do this, it is important to stay up to date with the latest cybersecurity predictions. Let's take a look at the top 5 major cybersecurity predictions for 2017. 1. Mobile Attacks Will Continue to GrowAttacks on mobile devices will not only grow in number but also in sophistication. To stay one step ahead of the cybercrime industry, businesses and organizations must stay on top of protection updates and remain aware of their vulnerable points in regards to mobile assets. 2. Ransomware Will GrowThe prevalence of ransomware will expand and 2017, and will likely catch up to distributed denial of service (DDoS) attacks. Expect both criminal and legitimate organizations to carry out these attacks with the aim of either influencing or silencing other organizations. It is likely that ransomware attacks, as well as DDoS attacks, will prevail in cloud-based data centers as well. Attacks of this kind are particularly threatening, as an attack on even a single organization has the capability of spreading to and disrupting many others. 3. Industrial IoT Will Become More VulnerablePower, water, and other utilities will become key targets for attackers looking to either for financial gain or to make a serious statement. A study found that out of the 180,000 control systems spread across 71 countries that are accessible via the internet, 91 percent of these possess vulnerabilities that can be remotely exploited by hackers. 4. Passwords Will Be ReplacedOut with the old in with the new. Instead of passwords, more advanced authentication technologies such as biometric scanning, facial recognition scanning, or authentication using one's own device will become the new norm for both digital content and physical buildings. 5. Security Will and Should Be ExternalizedWith the rapid expansion of cybercrime, it is no longer possible for small to mid-sized companies to take care of their own security operations. We can expect to see more businesses turning to third-party for security protections. This will also, in turn, most definitely lead to a boom in cybersecurity jobs. Cybersecurity Predictions ConclusionRemember, cybersecurity predictions are not mere trends that can be taken lightly, they are essential pieces of information for protecting your business. While cybersecurity may seem expensive, it comes at a fraction of the cost of getting hacked. The average total cost of a data breach in the United States is 6.5 million dollars. Not to mention, the immeasurable costs of data loss, physical infrastructure damage, and reputational damage. In today's world, 24/7 protection is necessary. Contact us today and we can discuss how we can help keep your website and your data safe.
How Ransomware Works and What You Should DoUnderstanding how ransomware works is the first step to protecting your interests. Here's what happens and how you can be proactive.Ransomware is on the rise. You may have heard of this term, but aren't sure exactly what it means. As a computer user, you should take careful precautions to protect yourself against malware, or know what to do in case of a ransomware attack. Keep reading to find out how ransomware works and how you can prevent it! What is Ransomware?Before diving into how ransomware works, let's take a look at what ransomware actually is. A type of malware, ransomware is delivered to your computer system through various means. Ransomware can make its way to you through the following:
There are different types of ransomware. However, each and every type will prevent you from using your computer normally. How Ransomware WorksRansomware works by first infecting a computer. Then, using modern cryptography methods, it encrypts files. Once encrypted, the files cannot be decrypted without the "key." The key is what hackers will provide once you have paid them ransom. Unfortuantely, hackers can target any computer users. Whether it's a home computer you're working on, endpoints in an enterprise network, or even servers used by a government agency or healthcare provider, ransomware can affect you. This means ransomware can get onto your computer from nearly any source that any other malware (including viruses) can come from. Ransomware can prevent you from accessing programs such as Windows, encrypt files so that you cannot use them, and/or stop certain web applications from running, such as your web browser. What to do After a Ransomware Attack
How to Prevent a Ransomware AttackThe best solution to ransomware is to be safe on the internet. This includes with emails and online chat. Check out the list below for how to make sure you stay safe on the internet:
What do you know about how ransomware works and how to protect yourself from it? Tell us about your experiences with ransomware in the comments!
Are the Biggest Cyber Security Risks Your Employees?It's true - studies show that within businesses, the biggest cyber security risks come from those employed. What can you do to protect your business? Read on.We all want to believe that our employees are honest, hardworking people who would do nothing to hurt our company. But the truth is, whether, by malice or accident, the biggest cyber security risks are almost always going to be your employees, and it’s getting increasingly difficult to ignore the string of high-profile cyber-attacks that are now a regular occurrence. Here’s what you can do about it. 1. Develop responsive IT structures and teamsOne of the most common complaints about IT security and employees is that IT moves too slowly for them to do their jobs effectively. Particularly with millennials and digital natives enter the workforce and their familiarity with cloud-based computing, the temptation is to install and use secure company resources and do work with insecure tools, devices, products, and services. What’s more, staff members (who, remember just want to do their job AND are under pressure to do more less using IT) often feel that the approvals process with the IT staff is just too slow. The result? It becomes impossible for IT to even know where their resource should be spent, let alone the most efficient way to spend them. Fortunately, there’s a solution that can work wonders. A lot of cloud applications are, in fact, secure enough to mitigate any cyber security risks. The only problem is that IT needs to know about them ahead of time. So the best way to help yourself is to make sure that your IT team is fully integrated and extremely responsive to new application requests. If you have more time and resources available, it pays to build your IT infrastructure so that you can support at least some cloud SaaS products, so you can say yes at least some of the time. 2. Explain the cyber security risks associated with common behaviorsDid you know that many workers use the same password for everything? OR write down their passwords and stick them in a notebook, on their computers or (worse) store them in a Word file on their computer? And this sort of behavior that creates cyber security risks isn’t exactly difficult to understand. Workers are busy, and they don’t want to spend time doing stuff like double logins or to change their passwords all the time (or trying to remember what their passwords are!) But if IT teams make an effort to explain why and create awareness about the very real risk of cyber security risks, then people are a lot more likely to comply with more stringent security requirements. Remember: even though you can dictate security policy, it’s a lot more effective if everyone is actually on board rather than just going through the motions. 3. Focus your security energy where it’s needed mostFinally, the best thing you can do for your security and the keeping your network secure from your employees is to focus your energy where it’s most needed. Building MORE security around set pieces of your network and letting most of the network stay at a more functional level will increase your safety and reduce the friction between the IT teams and employees. This compromise means that you get a high level of security, and they get to do their jobs faster and easier. Getting your team to take cyber security risks seriously doesn’t have to be an uphill battle. By making small changes, you can shift how your employees think about security, and thus make your whole network safer.
To this day, LinkedIn is still, by far, the most useful professional social network. Though there have been many concerns in regards to members being targeted by sale people, the issue is inevitable. As someone who make purchasing recommendations and decisions for multiple companies, even before LinkedIn was founded and became popular, I was getting at least 3 calls a day from the salesforce of various organizations. Today I wanted to recommend my top 3 cybersecurity companies to follow on LinkedIn. All 3 are hand picked for a variety of reasons. Following any of those listed will most likely help you develop a better understanding of information and cybersecurity related issues. I’ve listed them in no particular order, as i believe all 3 truly deserve to be followed. Imperva According to their LinkedIn profile, Imperva® (NYSE:IMPV), is a leading provider of cyber security solutions that protect business critical data and applications in the cloud, as well as on-premises. The company's SecureSphere, CounterBreach, Incapsula and Skyfence product lines enable enterprises to discover assets and risks, protect valuable information (such as intellectual property, business plans, trade secrets, customer and employee information, and the day-to-day data that drives your business). They also offer services that enable your business to comply with the myriad of increasingly stringent data protection regulations and mandates, as well as enforce policies, entitlements and audit controls. Having worked with Imperva for over 10-years, I can attest to the facts that their staff is a great bunch of dedicated, diverse and highly skilled folks. Their customer service and support line is truly one of the most efficient in the industry, with nearly instant response. They never hide behind an email wall, and are always there, in person, when you need them most. If you are interested in web application protection (and you should be), including the DDoS protection and website acceleration, you should follow Imperva. The Herjavec Group I happened to recall the time when Robert Herjavec founded the company. In fact, I believe I was one of the first customers of The Herjavec Group; they had assisted March of Dimes Canada by implementing an email security appliance. Since that day, I have been virtually following Robert and his company. As the company grew, many things changed, including product and service offerings, people and offices. The one thing that has not changed, is their sense of pride, its core people and their quality of service. In addition to timely updates that the company provides on LinkedIn and other social networks, if you haven’t already, you should also consider following Robert, as he often shares the stories and wisdom that made him into a Canadian success story. Checkmarx No longer a startup, this Israeli success story does not cease to amaze. In the early days, they found a problem whereby automated code security software was cumbersome and unaffordable for SMB’s. They have created something that did not rely on heavy and complex deployment requirements and it was truly affordable for virtually any size organization. Like every other start up, as the company matured, it began attracting major talent, allowing them to close large deals while winning against seasoned enterprise players such as HP and IBM. More often than not, they deliver high quality content on LinkedIn in an attempt to raise awareness, ensuring top executives understand the importance of software code security. |
AuthorSteve E. Driz, I.S.P., ITCP Archives
March 2024
Categories
All
|
8/13/2017
0 Comments