Leaders leverage our blog to stay up to date on latest cybersecurity practices and learn how to keep their data safe.

Welcome back to our series on the Canadian Program for Cybersecurity Certification (CP-CSC). In our previous blog post, we delved into the fundamentals of CP-CSC and how it aims to fortify Canada's...
In the ever-evolving landscape of cybersecurity, staying ahead of the curve is not just a necessity but a strategic imperative. The imminent implementation of the Canadian Program for Cybersecurity...
We are thrilled to announce that ALCiT has successfully achieved SOC 2 certification, a significant milestone that underscores our dedication to maintaining the highest Cybersecurity and data...
We have been getting this question more often lately and that is a great sign that people are starting to understand risks and exploring solutions. In this blog, we will dive into the pros and cons...
The first step in our process is "Assess" which aligns closely with the Five Functions of NIST. The main two reasons we start here are simple: 1: you can't protect what you don't know you have, 2:...
We were at the Western Manufacturing Technology Show two weeks ago and it was clear that many companies we were talking to had a very narrow view of cyber risks.
According to Wikipedia: Cyber resilience refers to an entity's ability to continuously deliver the intended outcome, despite cyber attacks. Resilience to cyber attacks is essential to IT systems,...
We are getting asked that questions more often lately and decided that writing a blog would probably help many.
Now that it is becoming clear that blocking 100% of cyber attacks is not possible, that prevention, damage control and a recovery plan are the most efficient strategies: Managed Detection and...
We are all familiar with the concept of technical debt (more here), but I think it is time that we start talking specifically about cybersecurity debt.
There was great feedback and some questions about our Cybersecurity 101 blog, this 201 blog will answer those and help you to continue improving your cyber resiliency. The assumption here is that you...
SIEM can make the difference between stopping an attacker while they get started vs after they've setup their entire plan, but how much should it cost?