The Open Government Implementation Plan document describes the Communications Security Establishment's (CSE) planned activities and deliverables aligned based on the...
File available for download in the following formats:
"In This Edition
Recent Approval of Two New Standards
Recent Discussion on Physical Security
Future Meeting Agendas September and December
Contact Us
"
File available for download in the following formats:
"Cloud computing has the potential to provide your organization with flexible, on-demand, scalable, and self-service information technology (IT) provisioning. To deliver this...
File available for download in the following formats:
The information in this publication identifies and describes acceptable security protocols and their appropriate methods of use to ensure continued protection of UNCLASSIFIED,...
File available for download in the following formats:
o Essential Mitigation
o Application Whitelisting
o Spear Phishing
o Taking Care of Your Secure Communications Device
o Using Portable Media
o Mobile Device Management
File available for download in the following formats:
o Top 10 For Everyone o Put Your Money Where Your Data Is – Invest In Cyber Security o CSE’s Assessment On Cyber Threats To Canada’s Democratic Process o The Forecast On Cloud...
File available for download in the following formats:
o The Canadian Centre for Cyber Security o Meltdown and Spectre o Trending Topic: Cloud Benefits o COMSEC Update o Assemblyline o CSE in the Community: Hackergal o ITSLC News
File available for download in the following formats:
o Network Security Zones o Smart Computing Tips for Everyone o Securing WLANs o Risk Management for iPads o Common Challenges to Adopting a Risk Management Strategy o Minimizing...
File available for download in the following formats:
o 5 Tips for Protecting Classified Information o Modernizing our Secret Infrastructure o Security Categorization for an Open Government o Go Ahead...This Line is Secure o...
File available for download in the following formats:
o Don’t Fall Victim to Ransomware: 5 Actions to Protect Your Network o Cyber Security Event Management Plan o Treasury Board Secretariat of Canada “Engarde” Exercise o How Are...
File available for download in the following formats:
o CSE’s Top 10 Security Actions o The Dangers of Free Dynamic DNS o Using a Blackberry as a Hotspot o Cyber Security Considerations for Management o Hardware Security Modules o...
File available for download in the following formats:
o Instant Messaging Security Risks o Spotting Malicious Emails o GC CIRT Pointer: Exploit Kits o Securing your GC SECRET Network o Sharing Information across Different Security...
File available for download in the following formats:
o Interview: Why the Top 10? o Denial of Service o Mobility Security o Cyber Security Awareness Month o Zero-Day Exploits o Disposition of Windows XP o Cross Domain Solutions
File available for download in the following formats:
o Social Media Security Pitfalls o Success of your Departmental Mission o Anatomy of a Cyber Intrusion o Securing BlackBerry Devices o Using Wi-Fi While Travelling
File available for download in the following formats:
The recent cyber threat activity against the democratic process in the United States and Europe has raised concerns about similar threats to Canada. In this assessment, we...
File available for download in the following formats:
"This document is intended for elections authorities. It introduces common threats to Canada’s electoral processes and provides guidance on protecting the systems and the people...
File available for download in the following formats:
This bulletin aims to describe the risks posed by, and possible mitigations for, the exposure of classified IT systems to wireless signals and mobile devices that are not...
File available for download in the following formats: