Phirelight Blog

Phirelight Participates in Ottawa Mayor’s Cyber Challenge Cup

Posted by | Announcements, Blog, News | No Comments

To be presented by Ottawa Mayor Jim Watson, in person! We at Phirelight Security Solutions are pleased to annouce our paricipation in Jim Watsons Cyber Security | Challenge | Sécurité Informatique (CyberSCI)! Phirelight Security Solutions is participating alongside… CGI, Bell Canada, the Bank of Canada and the Communications Security Establishment (CSE) in the second annual Cyber Security | Challenge | Sécurité Informatique (CyberSCI), a city and regional cyber security (hacking) competition for students in the Ottawa area. On Saturday, Nov. 18th 2017, students selected from Carleton University, University of Ottawa, Algonquin College, and La Cité will compete in teams to…

Read More

Gartner’s Top Security Technologies For 2017 Includes Network Traffic Analysis (NTA)

Posted by | Blog | No Comments

GARTNER’S TOP SECURITY TECHNOLOGIES FOR 2017 INCLUDES NETWORK TRAFFIC ANALYSIS (NTA) rapidPHIRE is one of the leading NTA solutions Gartner, Inc. (NYSE: IT) is the world’s leading research and advisory company and has identified the Top Security Technologies for 2017 in their Press Release of June 14th, 2017 – see Gartner Identifies the Top Technologies for Security in 2017 (https://www.gartner.com/newsroom/id/3744917).  In the Press Release, Gartner identifies Network Traffic Analysis (NTA) as one of the technologies to watch. NTA solutions like rapidPHIRE are systems that detect malicious activity by searching for packets commonly used for attacks sent between your network and…

Read More

Endpoint Security: What You Need To Keep Endpoints Safe

Posted by | Blog | No Comments

The endpoint remains the most attractive and easy target for hackers to compromise a network. Attacks are changing and advancing so quickly that it’s impossible to protect against everything. When all it takes is one misplaced click to infect an endpoint, monitoring and remediating becomes not only an important, but necessary tactic in endpoint security. Modern endpoint security tools have been advancing along with cyber threats, and contain new features and strategies to properly detect, locate, isolate, and remediate threats on endpoints, before they enter the network. The philosophy of these new tools is that endpoints are the first targets…

Read More

Password Protection: What You Need To Know

Posted by | Blog | No Comments

The balancing act of creating passwords that are both secure and memorable has left many of us falling flat on our faces. Whenever a new vulnerability is discovered or a new high-profile breach occurs, we are reminded of the lacking security of our passwords, and the world goes into password protection mode. The public is warned to change their passwords and a slew of password advice blogs hit, with most people forgetting to actually take action on these recommendations. The “it won’t happen to me” mentality often trumps the idea of having to take the time and effort to replace…

Read More

Is Network Traffic Analysis Worth The “Hype”?

Posted by | Blog | No Comments

Gartner’s self-named “Hype Cycles”, provide readers with a way to visualize how new technology will evolve over time. This visualization shows the adoption and maturity timeline of technologies and new innovations in the market. There are many valuable insights to be found in Gartner’s Hype Cycle for Infrastructure Protection 2015, written by Gartner Analyst Greg Young. 1 Infrastructure Protection Hype Cycle This particular Hype Cycle report discusses a variety of enterprise security technologies, their locations in the hype cycle, and their time to maturity. It also gives buyers useful guidance on whether or not to invest in particular types of…

Read More

The Shortcomings of Cyber Insurance, and the Ugly Truth About Your Security Posture

Posted by | Blog | No Comments

If you work for a small-to-medium business (SMB), chances are you’ve heard of cyber insurance… No Love for the SMB In 2014, the Center for Strategic and International Studies announced a stifling statistic, stating that more than half of the U.S companies targeted in cyber attacks were in the small-to-medium sized business space. The larger multinational enterprises, though still a target, tended to have sophisticated protection for their attack surfaces, in-house security teams, and deeper pockets. This means that loss due to an attack wouldn’t necessarily financially cripple the larger enterprise, but could ruin an SMB. The truth is that…

Read More