Skip to content

Alex Dow


Blog Post by Alex Dow

Sep 5, 20236 min read

Incident Response Imbalance

This year, Canada has experienced an unprecedented wildfire season. Starting earlier, ...
Start Reading
Aug 16, 20231 min read

3 Things to Know about Breach Inheritance

Breach Inheritance: A cyber breach you inherit through a third-party supplier or partner ...
Start Reading
Aug 9, 20232 min read

Cloud Security: To Cloud or Not to Cloud?

Go to The Cloud? Cloud Affords Us many capabilities, but I will focus on one of the most ...
Start Reading
Jul 4, 20231 min read

But isn't Cloud more secure?

Cloud adoption is (for most cases) a no-brainer and businesses that don't have an IT army ...
Start Reading
Feb 8, 20235 min read

4 Business Days: The New SEC Disclosure Rules

The times are a-changin' They say a rising tide raises all boats, and in the world of ...
Start Reading
Dec 16, 2021< 1 min read

Giving Back this Holiday Season

We are grateful that our team members are safe and healthy, and that we were able to have ...
Start Reading
Nov 17, 20211 min read

Simplifying Vendor Risk Management in the Mining and Metals Industry

Introducing the MM-ISAC Cyber Security Readiness Rating The Goldcorp data breach of 2016 ...
Start Reading
Oct 7, 20213 min read

Kubernetes Attack Surface in 5

Kubernetes has become ubiquitous in the deployment of applications and microservices. Its ...
Start Reading
Sep 9, 20214 min read

Github's Copilot Security Concerns in 5

Github recently released Copilot, an artificial intelligence powered assistant tool ...
Start Reading
Sep 2, 20214 min read

Why Operational Technology (OT) Security Sucks in 5

What is Operational Technology? Operational Technologies (OT) is the broad categorization ...
Start Reading
Aug 31, 20214 min read

The "Official" Definition of Critical Software in 5

We could easily say that 2021 is the year the world realized the importance of good ...
Start Reading
Aug 26, 20212 min read

The NSA's Kubernetes Hardening Guidance in 5

The National Security Agency (NSA) in collaboration with the Cybersecurity and ...
Start Reading