-
2012-2023 Employment tenure distribution for the Communications Security...
This dataset represents the employment tenure distribution for the Communications Security Establishment. -
Fact sheet for Canadian political campaigns: Protect yourself online
Cyber security guidance -
Post-secondary cyber security related programs
The intent of this guide is not to recommend any schools or programs, but to provide a listing of available programs that may help advance an individual’s career in the field of... -
Targeted manipulation: Iran's social engineering and spear phishing campaigns
Cyber security guidance -
Annual Report to Parliament on the Administration of the Access to...
This is the ninth annual report prepared by the Communications Security Establishment (CSE) and tabled in Parliament in accordance with section 94 of the Access to Information... -
Top measures to enhance cyber security for small and medium organizations...
Cyber security guidance -
Artificial Intelligence - ITSAP.00.040
An overview of artificial intelligence and how machines use data, algorithms, and learning models to perform tasks that typically require human intelligence. -
The Changing Nature of How We Work
o Web 2.0 Security Risks o Data Diodes in a Cross-Domain Solution o The Importance of a Departmental TA o Two-Factor Authentication o Cloud Computing -
Building a Strong Foundation for the GC
o Social Media Security Pitfalls o Success of your Departmental Mission o Anatomy of a Cyber Intrusion o Securing BlackBerry Devices o Using Wi-Fi While Travelling -
Strategies for protecting web application systems against credential...
This document provides web application and system administrators with security recommendations to protect web application systems against credential stuffing attacks. -
Top 10 IT security actions: No.3 managing and controlling administrative...
This document outlines some of the actions that your organization can take to manage and control administrative privileges. -
Security considerations for industrial control systems (ITSAP.00.050)
An industrial control system (ICS) automates and controls industrial processes (e.g. manufacturing, product handling, production, and distribution) and mechanical functions to... -
Cyber Threats To Canada's Democratic Process
The recent cyber threat activity against the democratic process in the United States and Europe has raised concerns about similar threats to Canada. In this assessment, we... -
Password managers: Security tips (ITSAP.30.025)
Cyber security guidance -
Preparing your organization for the quantum threat to cryptography (ITSAP.00.017)
Cyber security guidance -
Transitioning to a cyber resilience approach (ITSAP.10.190)
Cyber security guidance -
Doppelganger Campaigns and Wire Transfer Fraud
The purpose of this Information Note is to draw attention Doppelganger Campaigns and Wire Transfer Fraud. -
Cloud Security Risk Management (ITSM.50.062)
To enable the adoption of cloud computing, the Government of Canada (GC) developed an integrated risk management approach to establish cloud-based services. ITSM.50.062 outlines... -
Mobile devices and business travellers (ITSAP.00.087)
Cyber security guidance -
Security Considerations for the Use of Removable Media Devices for Protected...
This bulletin is in support of the Treasury Board of Canada Secretariat (TBS) Information Technology Policy Implementation Notice 2014-01 (ITPIN: 2014-01). The notice, released...