Security Publications

View this page in: Français

Threat smart: Building a cyber resilient financial institution

A proliferation of cyber events in recent years has revealed that the traditional approach of addressing information security and technology risks is no longer sufficient.

Cyber risks: a severe and present danger

Today, security compromises are a persistent — and globally pervasive — business risk.

The convergence of everything digital

The convergence of everything digital How the fusion of information, operational, and consumer technologies will transform the security landscape for business and society.

How can you deal with ShellShock?

The vulnerability, known as “ShellShock,” takes advantage of a bug discovered within the GNU Bourne-Again Shell (BASH) which allows malicious users to remotely execute commands, regardless of restrictions placed on the environment.

Internet Explorer Zero-Day Vulnerability (CVE-2014-1776)

A newly discovered vulnerability in the Microsoft Internet Explorer browser versions 6 to 11 was publicly disclosed by Microsoft on April 26th, 2014. This vulnerability is a ‘zero-day’ vulnerability which is a vulnerability that was previously unknown and is being actively exploited now.

PwC Cyber Intelligence Briefing: Demystifying 'Heartbleed'

Learn more about the 'Heartbleed' breach and what you can do to protect yourself.


View a collection of our cyber resilience publications.

Cyber security crisis management: A bold approach to a shadowy nemesis

As cyber crime runs rampant, major cyber incidents and data breaches that would have been unimaginable just a few years ago, are wreaking havoc on organizations of every stripe.

Embedding cyber security into the energy ecosystem: An integrated approach to assessing cyber threats and protecting your assets

Last summer, one of the world’s largest oil and natural gas producers discovered that a virus had infiltrated 30,000 of its computer workstations. Today’s cyber threats are persistent, well organized, constantly evolving— and often successful.

Defending yesterday: Key findings from the Global State of Information Security® Survey 2014

The security strategies of yesterday aren’t working against highly skilled adversaries using techniques and technology of tomorrow.

Video Library

Our team of cyber resilience experts discuss the latest developments in the cyber resilience area.

Are you compromised, but don’t know it? A new philosophy for cyber security

Read this publication to learn more about how you can better protect your business from cyber threats by applying a new philosophy to cyber security.

Detecting advanced cyber intrusions and cyber-based economic espionage

Download this publication to learn about the consequences of cyber attacks and espionage and what to do in the event that your organization is targeted.

Protecting information assets: Top security considerations for internal audit

Read this publication to learn what you need to know to protect your organization from cyber crime, theft and destruction from an increasingly malicious internet.

Trial by Fire: Key Insights from the 2010 Global Information Security Survey

Nearly 40% of Canadian survey respondents didn’t know if their organizations had experienced a breach in security. This should be a wake up call for all CEOs, CIOs and CISOs.