GET UP TO SPEED ON ALL THINGS CYBER
We facilitate the exchange of crowdsourced cyber insights, experiences and differing opinions that challenge the status quo.
Our mission is to elevate cybersecurity awareness and defense through the content we generate. All of our original content is steered by our Content Advisory Committee, comprised of cyber leaders that you recognize and trust.
Our audience is diverse, ranging from CXO and board members, to members of the public with an interest in IT security such as students and business owners. Discussions address topics in business and personal security. Content published on Cyber Business Review is always ungated and freely available.
LATEST CYBER NEWS
08/22/2024 McDonald’s Instagram hackers make $700K shilling Grimace memecoin
Scammers hacked the official McDonald’s Instagram account to promote a sham memecoin based on the fast food giant’s mascot Grimace. (read more)
- - - - - - - - - - - - - - - - - - - - - -
08/26/2024 Uber fined $325 million for moving driver data from Europe to US
The Dutch Data Protection Authority (Autoriteit Persoonsgegevens, AP) has imposed a fine of €290,000,000 ($325 million) on Uber Technologies Inc. and Uber B.V. over GDPR violations. (read more)
- - - - - - - - - - - - - - - - - - - - - -
08/21/2024 Hackers steal banking creds from iOS, Android users via PWA apps
Threat actors started to use progressive web applications to impersonate banking apps and steal credentials from Android and iOS users. (read more)
AN ANNOUNCEMENT ABOUT OUR FOUNDER
-
Sorry for being silent and reaching out this late – it has been one and a half years since Steve Tso’s passing. His death has been a profound loss, and we do this with heavy hearts.
Steve fought pancreatic cancer courageously for over two years with his usual good spirits, buoyed by his many friends – like you – his family, and his faith. He passed peacefully on March 22, 2023, surrounded by his loving family and friends.
In honoring Steve's life and highlighting his commitment to helping sick children and their families, his family would appreciate memorial gifts to be made to the Ronald McDonald House. Donating to this cause would not only honor his memory, but also provide much-needed support to the children and families who are receiving specialized care and services. Your charitable gift can help to ensure that his legacy of compassion for others lives on, and that sick children have access to the best possible care and resources. We extend our deepest condolences to Steve's family and loved ones.
We thank you for considering a donation in his memory. Donations can be made using this link: https://rmhbc-in-memory.raisely.com/tsokinglokstephen.
-
Steve Tso is a beloved figure in the B2B marketing community and a passionate advocate for value-based marketing. His impact was profound, marked by his dedication to cybersecurity education and his innovative contributions.
As the founder of Cyber Business Review (CBR), Steve established a platform that served as a model of unbiased cybersecurity knowledge sharing. Through CBR, he fostered a community committed to staying informed and empowered in the face of evolving digital threats.
Prior to CBR, Steve made significant contributions to leading organizations in the cybersecurity sector. During his tenure as the head of Americas Marketing Campaigns at Symantec, he distinguished himself by winning the ANA's B2B Marketing Award for Best B2B Custom Publication with his groundbreaking crowdsourced book, "Canadian Cybersecurity." Before joining Symantec, Steve led the marketing efforts at Palo Alto Networks Canada, where he played a pivotal role in shaping the company's presence in the Canadian market.
Steve's legacy extends far beyond his professional accomplishments. His personal touch and connection marked all areas of his life. He was known for his warmth, generosity, and unwavering commitment to making the world a safer place through his work. His passing leaves a void in our community that will be deeply felt by all who had the privilege of knowing him.
We extend our heartfelt condolences to Steve's family, friends, and colleagues during this difficult time. The world is a lot less bright these days without Steve’s presence, and that can be felt by anyone who had the privilege of having Steve in their life. Steve’s motivation was contagious, and if you had the privilege of working with Steve, you knew you were always on the winning team – even in the way he lifted everyone up with his unwavering dedication and overflowing compassion. Steve tirelessly worked to spread joy and uplift those around him. Whether through small acts of kindness or grand gestures of generosity, Steve made it his mission to make the world a brighter and more beautiful place for everyone.
The impact of Steve’s legacy continues to shine brightly, reminding us all of the power of love, kindness, and the indelible mark one person can leave on the world. Steve’s spirit lives on in the hearts of those he touched, inspiring us to carry forward his legacy of compassion and positivity. Rest in paradise, Steve. Your light will forever guide us, and may his memory continue to inspire us all to strive for excellence and make a positive impact in the world, just as he did.
-
Steve’s vision, dedication, and hard work have laid a strong foundation for us to continue to build the Cyber Business Review and Cyber Business Marketing.
Esther Kosa, Steve’s sister, is committed to continuing his legacy and ensuring that the business continues to flourish. To achieve this, she has enlisted the expertise of a life-long friend and consultant, John Wong, to review operations and identify areas for improvement.
Krystle McGilp will continue to be the go-to contact for communication with the Cyber Business Review Committee by submitting articles from contributors for approval and handling the social media accounts for the Cyber Business Review.
We will continue to work diligently to solidify our partnerships and ensure that we continue the good work that Steve has started. Your ongoing support and collaboration are invaluable to us, and we look forward to strengthening our relationship as we move forward together.
Thank you for your continued trust and partnership. Together, I am confident that we can honor Steve’s legacy and achieve even greater success in the future for the Cyber Business Review.
- Esther Kosa
El Salvador's Digital Revolution: A New Frontier in Global Innovation
16-Oct | Written by Jean Loup P. G. Le Roux
El Salvador’s digital revolution offers a preview of what technology-driven economies might look like in the future. From the adoption of Bitcoin to the establishment of Bitcoin City and the rollout of a national digital identity system, the country is attempting to redefine what it means to be a modern, connected economy.
Harnessing the Power of AI in Cybersecurity: Safeguarding Tomorrow's Digital Frontier
10-July
As we look to the future, one technology stands out as a beacon of hope in the ongoing battle against cyber threats: Artificial Intelligence (AI) making cybersecurity more critical than ever.
Navigating the Digital Battlefield: The State of Cybersecurity in 2024
20-February
As we step further into the digital age, the importance of cybersecurity has never been more pronounced. In 2024, our reliance on interconnected systems, smart devices, and cloud technologies has reached unprecedented levels, making the protection of sensitive information and digital assets a critical priority.
Potential Solutions at the Right End of the Cyber Talent Pipeline
19-May | Written by Edward Pereira
For years we have been told that there is a severe shortage of workers with cybersecurity skills and experience, both in Canada and internationally. Most studies have described a crisis in terms of hundreds of thousands, even millions of job vacancies, depending on the scope of the study.
Twitch, Breached. A Hacktivism Reboot?
14-February | Written by Jean Loup P. G. Le Roux
A few weeks ago, the whole world reeled on the news that Twitch had been hacked. Millions of people instantly flocked to haveibeenpwned.com to see if their emails had been compromised and quickly changed their passwords.
IoT Security: New US Regulation to the Rescue!
5-March | Written by Jean Loup P. G. Le Roux
The many security problems linked to the Internet of Things (IoT) is not a new subject - cybersecurity experts have been warning everyone about these vulnerabilities for a long time now. While manufacturers have refused to heed these warnings (for the most part), legislation is now finally catching up.
When cloud software providers claim their solution is secure, watch for these 9 red flags
11 - January | Written by Eric Gold
There are serious consequences for both organizations and their stakeholders when software providers make misleading or confusing security claims. The livelihoods of businesses and individuals rest on such claims.
Cybersecurity Attacks in 2020: How Bad Did It Get?
23-November | Written by Jean Loup P. G. Le Roux
As we wrap up 2020, it's time to reflect back on this pivotal year that was from a cybersecurity perspective. Jean Loup P.G. LeRoux, CEO of I&I Strategy, shares his insights on cyber-related highlights and lowlights. He also offers some personal suggestions on how companies can ramp up their cyber posture as we head into 2021. – Steve Tso
Quantum Computing, Cryptography, and Information Security: Where Are We Headed?
2-November | Written by Luigi Bruno
Quantum computing brings next-level of computing power to cybersecurity to both the hacker and the defender. What exactly is quantum computing as it pertains to cyber? How does it change the game? What's its future? Luigi Bruno (Doctoral Candidate – McGill University, Faculty of Law) breaks it down in this CBR article. – Steve Tso
What the Twitter Hack Proves About Private Communications (Not Another Bitcoin Article)
1-October | Written by Jean Loup P. G. Le Roux
Back in July 2020, Twitter announced that 130 accounts had been hacked. The hackers tweeted from 45 of them from, 36 had their direct messages accessed, and 7 accounts had their data downloaded. How does a company as large and as sophisticated as Twitter get hacked? Jean Loup Le Roux takes a deep dive into what happened, and discusses ways for future prevention. – Steve Tso
How National Standards are Shaping the Digital Economy
25-August | Written by Matthew MacNeil
Standards are industry guardrails. Their purpose is to protect stakeholders. Ever wonder how standards are established in the technology space and how they affect our digital economy? This article by Matthew MacNeil (Director, Standards and Technology, CIO Strategy Council) explains the internal processes involved in creating the National Standards of Canada, and how they shape our day to day. – Steve Tso
Canada’s new Cyber Security Program for SMOs: An inside look at the development of Canada’s National Cyber Security Standard
18-August | Written by Matthew MacNeil
Hackers don’t care if you’re a Fortune 500 company or if you’re a mom and pop retail business. The notion of “we’re too small to get hit” is naive and dangerous in today’s age of automated cyber attacks. The CIO Strategy Council is working with the Canadian Federal Government to put forth a set of standards specifically catered for small and medium sized businesses. In this article, Matt MacNeil (Director, Standards and Technology, CIO Strategy Council) shares background on this relationship and provides a preview of what the standards may look like. – Steve Tso
Privacy in the Age of Facial Recognition
8-July | Written by Alexander Rau
If you have a social media account, someone already has a digital file of your face on their database. This is a privacy concern. Unfortunately for most users, the extent of this concern remains unknown, largely due to lengthy fine prints or tedious communication processes. This article by Alexander Rau journals his personal experience of approaching one facial recognition software company to find out exactly what biometric information they owned on him. It includes the necessary links in case you’re interested to run the same experiment. – Steve Tso
How can someone legally access your data in the cloud [without you knowing]?
2-July | Written by Jean Loup P. G. Le Roux
Whenever the topic of unauthorized cloud data access surfaces, most point to cyberattacks as the expected culprit. Yet, there are LEGAL avenues for organizations to access your cloud data. Jean Loup P. G. Le Roux takes a look at two possible ways this can be done- through “jurisdiction” and “regulatory” systems and outlines what you can do to protect yourself against this. - Steve Tso
Deception = Distraction + Decoy
29-May | Written by Steve Tso
Phishing is a form of deception, and deceptions are comprised of two components: a distraction, and a decoy. The greater the distraction, the more effective the decoy. Both work together to entice its victims to commit. CV-19 represents an impactful distraction that’s prolonged. And hackers are taking advantage by pairing CV-19 with a myriad of relatable decoys. This article discusses the ramification of this through the lens of a typical Canadian family.
Buckle Up! Because Cyber Saves Lives
11-May | Written by Steve Tso
Similar to not wearing a seat belt, not taking cybersecurity preventative measures is irresponsible. In this article, I draw a comparison between the two and explain how getting to the point of being numb with something that’s clearly in the wrong doesn’t make it right. I then discuss the origins of Cyber Business Review, how it works, and how you can get involved.
IT’s New Security Challenge in a Post-Pandemic World
11-May | via Forbes
There’s been much discussion around what the office of the future may look like post COVID-19. However, there hasn’t been much information on how this extends to healthcare facilities and how the ER of the future may operate…
Hacker Sells 22 Million Unacademy User Records
8-May | via Bleeping Computer
We’ve all heard it before, and some may even be numb to it. “Company X got hacked and Y amount of personal data was stolen”. Well, what does that really look like? This article from bleepingcomputer.com paints a dark reality on what hackers sell post breach…
SUBSCRIBE TO OUR NEWSLETTER
to receive news and updates
By signing up, you agree to our Privacy Policy.