Let's Get Critical
This article originally appeared in Canadian Gaming Business Magazine. Over the last year, I’ve had critical infrastructure protection on my mind. Critical infrastructure (CI) is an area that is in...
This article originally appeared in Canadian Gaming Business Magazine. Over the last year, I’ve had critical infrastructure protection on my mind. Critical infrastructure (CI) is an area that is in...
BULLETPROOF Expands Cybersecurity Services in Europe to Multiple Industries
Originally appeared in Global Gaming Business Magazine. When I wrote my first article for Global Gaming Business magazine back in January 2012, just one state, Nevada, had regulated online poker. M...
BULLETPROOF Appoints Gus Fritschie as Vice President, IT Security Solutions Development & Delivery
Would it help you, your team and your organization as a whole if you were able to focus on the high-value work of transforming your core business instead of having to spend your days fending off se...
Bulletproof is proud to announce the release of Bulletproof 365 Enterprise (B365E), end-to-end intelligent security powered by Microsoft 365 and Azure Sentinel.
Bulletproof recognized as the winner of the 2019 Microsoft Canada Modern Workplace Innovation Partner of the Year IMPACT Award!
As you have been hearing Microsoft has ended support for its popular legacy products: Windows Server 2008 and SQL Server 2008.
We want to help bring cybersecurity as a career choice to the forefront. And with a global shortfall of 1.8 million cybersecurity professionals expected by 2022, now is the time to inspire, educate...
New Mandatory Canadian Breach Requirements Now in Effect – Are you Prepared?
Phishing has changed the way we trust email. Learn how SPF, DKIM, and DMARC can help you prevent phishing by enhancing your email security.
October is Cyber Security Awareness Month and each week we’ll highlight different aspects of cybersecurity including risks associated with outdated core system software and services, cloud security...
For years, IT had a choice: you could either be secure or productive, but you couldn’t be both. Today, you can protect your business without sacrificing user experience.
Have the limitations of BYOD changed? A new technology from Microsoft called Mobile Application Management (MAM) may be a great reason to revisit BYOD.
Maintain a Mature Patch Management Process to Accelerate IT Security in 2018 According to Microsoft, 99% of all exploited vulnerabilities could have been prevented by an available patch or update. ...
Cybersecurity. The science of securing IT infrastructures. Firewalls, access lists, passwords, encryption, penetration testing, intrusion detection, etc. A crazy sysadmin once told me that the only...