Cyber Journals

Edition Contents Date Download
Edition 12

Building Stronger Cyber Security

  • Top 10 For Everyone
  • Put Your Money Where Your Data Is – Invest In Cyber Security
  • CSE’s Assessment On Cyber Threats To Canada’s Democratic Process
  • The Forecast On Cloud Computing
  • Cyber Hygiene Series: Social Media
  • CSE In The Community
2017-10-02 HTML // PDF (1.69 MB)
Edition 11

Be Proactive: Prevent Malicious Attacks On Your Network

  • Don’t Fall Victim to Ransomware: 5 Actions to Protect Your Network
  • Cyber Security Event Management Plan
  • Treasury Board Secretariat of Canada “Engarde” Exercise
  • How Are Your Cyber Hygiene Habits?
  • Internet of Things – The Future is Now
2017-06-07 HTML // PDF (2.45 MB)
GTEC Special Edition

Cyber Journal GTEC 2016

  • Quantum Computing and the Security of Public Key Cryptography
  • Leveraging Blockchain for the Government of Canada
  • Using GC Mobile Devices on Public Networks
2016-10-24 HTML // PDF (1.71 MB)
Edition 10

Protecting Classified Information

  • 5 Tips for Protecting Classified Information
  • Modernizing our Secret Infrastructure
  • Security Categorization for an Open Government
  • Go Ahead...This Line is Secure
  • Electromagnetic Emissions
  • Supply Chain Integrity
2016-08-24 HTML // PDF (2.42 MB)
Edition 9

Continuing to Advance Our IT Security Goals

  • Canadian Medium Assurance Solutions
  • Shared Services Canada’s Security Operations Centre
  • CSE’s Top 10 and Shared Services Canada
  • CSE’s Top 10 in the Mobile Environment
2016-04-18 HTML // PDF (1.44 MB)
Edition 8

Building a Resilient Network

  • Interview: Why the Top 10?
  • Denial of Service
  • Mobility Security
  • Cyber Security Awareness Month
  • Zero-Day Exploits
  • Disposition of Windows XP
  • Cross Domain Solutions
2015-10-16 HTML // PDF (1.51 MB)
Edition 7

Keeping Pace with Emerging Threats

  • CSE’s Top 10 Security Actions
  • The Dangers of Free Dynamic DNS
  • Using a Blackberry as a Hotspot
  • Cyber Security Considerations for Management
  • Hardware Security Modules
  • Windows 7 Hardening Guide
  • Measures to Protect Your Network
2015-03-02 HTML // PDF (1.97 MB)
Edition 6

Keeping our Information Secure

  • Instant Messaging Security Risks
  • Spotting Malicious Emails
  • GC CIRT Pointer: Exploit Kits
  • Securing your GC SECRET Network
  • Sharing Information across Different Security Domains
  • VoIP for GC Departments
  • TBS Corner: Web 2.0 and the GC
  • Application-Based Firewalls
2014-08-01 HTML // PDF (1.46 MB)
Edition 5

The Changing Nature of How We Work

  • Web 2.0 Security Risks
  • Data Diodes in a Cross-Domain Solution
  • The Importance of a Departmental TA
  • Two-Factor Authentication
  • Cloud Computing
2014-02-01 HTML // PDF (2.03 MB)
Edition 4

Building a Strong Foundation for the GC

  • Social Media Security Pitfalls
  • Success of your Departmental Mission
  • Anatomy of a Cyber Intrusion
  • Securing BlackBerry Devices
  • Using Wi-Fi While Travelling
2013-09-01 HTML // PDF (1.78 MB)
Edition 3

Network Security: Protecting Our Information Assets

  • Network Security Zones
  • Smart Computing Tips for Everyone
  • Securing WLANs
  • Risk Management for iPads
  • Common Challenges to Adopting a Risk Management Strategy
  • Minimizing Administrative Privileges
  • Java Mitigation Measures
  • Security Patching and CVEs
2013-07-01 HTML // PDF (1.39 MB)
Edition 2

Cyber Mitigation: The Essential Steps

  • Essential Mitigation
  • Application Whitelisting
  • Spear Phishing
  • Taking Care of Your Secure Communications Device
  • Using Portable Media
  • Mobile Device Management
2013-03-01 HTML // PDF (1.64 MB)
Edition 1

IT Security: An Individual and Collective Responsibility

  • Risk Management
  • Cyber Mitigation – Patching
  • Best Practices – Passwords
  • Securing WLANs
  • Procuring Assured Products for Protected B Networks
2012-10-01 HTML // PDF (0.86 MB)

Subscribe to our Cyber Journal RSS Feed to receive upcoming editions of the Cyber Journal.