News

From the President & CEO: Cybera community update and look ahead

With so much going on within Cybera and our wider community, I wanted to pause to review what weโ€™ve accomplished in the latter quarter of 2023, and what we have planned for the year ahead. This past fall saw many big wins for Cybera and our community: the announcement that the Australian National Research and […]

From the President & CEO: Cybera community update and look ahead Read More ยป

New platform will help fill Albertaโ€™s skills gaps

A web platform that helps Albertans match their skills and experience with the most sought-after jobs โ€” as well as find opportunities to learn in-demand skills โ€” is now available for a limited-time public preview. SkillUp provides an incredibly detailed (and user-friendly) Alberta labour market overview and education referral tool.  Built by Cybera (Albertaโ€™s not-for-profit research and

New platform will help fill Albertaโ€™s skills gaps Read More ยป

ShareIT hits new group spend/saving milestone as it opens up to municipalities

Albertaโ€™s ShareIT public procurement program has hit a major new milestone in its group spend and savings. Since it was launched in 2017 by Cybera โ€” in collaboration with Albertaโ€™s post-secondary institutions โ€” the program has marked over $100 million in cumulative member spending on IT hardware, licenses, and other services via ShareITโ€™s negotiated agreements.

ShareIT hits new group spend/saving milestone as it opens up to municipalities Read More ยป

eduroam comes to the Calgary Airport

The Calgary Airport Authority has announced its launch of eduroam, the secure, global Wi-Fi roaming service for students and researchers. Post-secondary students, researchers, and faculty passing through the Calgary International Airport (YYC) now have access to the trusted and secure internet service. This represents the first airport in Alberta (and only the second in Canada)

eduroam comes to the Calgary Airport Read More ยป

Data science interns take a โ€œtripโ€ to Vertical City

With exaggerated hand gestures, data science intern Aldebaran Saldaรฑa comedically ushers me in and out of a life-size โ€œelevator simulatorโ€ โ€” a small, curtained-off rectangle with a monitor mounted in the top right corner. “I feel like a border security officer,โ€ he says. โ€œPassports, please!” Rishabh Shukla, another intern, shares the systemโ€™s findings from behind

Data science interns take a โ€œtripโ€ to Vertical City Read More ยป

The trials, tribulations, and triumphs of a k-12 school network analyst

Chris Sluggett leads the talented and highly commended Technology Services team at Wolf Creek Public Schools, a school district covering rural communities north of Red Deer. The breadth of responsibility for his team โ€” from enabling online learning, to protecting student privacy, to keeping the lights on โ€” can be overwhelming to outsiders. But it

The trials, tribulations, and triumphs of a k-12 school network analyst Read More ยป

Step five of building cybersecurity: Implementing the CIA triad to combat risks

Part 7 of Cybera’s Introduction to Cybersecurity series Confidentiality, integrity and availability โ€” also known as the CIA or AIC triad โ€” is a model designed to guide policies and actions to build information security within an organization. Confidentiality The National Institute of Standard and Technology (NIST) defines confidentiality as:ย  โ€œPreserving authorized restrictions on information

Step five of building cybersecurity: Implementing the CIA triad to combat risks Read More ยป

Step Four of building cybersecurity: Identifying your risks

Part 6 of Cybera’s Introduction to Cybersecurity series What are some of the top cybersecurity challenges? Cybersecurity is continually challenged by hackers, data loss, privacy demands, and increased surface attack risks, coupled with the need to constantly evolve security strategies. These strategies must address these external threats, as well as internal pressures from any workforce

Step Four of building cybersecurity: Identifying your risks Read More ยป

Step three of building cybersecurity: Threats vs Attacks

Part 5 of Cybera’s Introduction to Cybersecurity series In our previous post, we defined โ€œattacksโ€ and โ€œthreatsโ€, and provided a comprehensive list of the different threats modern organizations typically face. In this post, weโ€™ll focus on attacks. What is an attack? While threats are not always intentional (e.g. natural disasters), an attack is an intentional,

Step three of building cybersecurity: Threats vs Attacks Read More ยป

Step two of building cybersecurity: What threats do you face?

Part 4 of Cybera’s Introduction to Cybersecurity series Once you have developed a full inventory of your operational environment (as outlined in our previous post), the next step is to try and uncover the intentional and unintentional dangers they face. From a security standpoint, threats and attacks are two separate but critical issues. For network

Step two of building cybersecurity: What threats do you face? Read More ยป

Step one of building cybersecurity: What do you Know?

Part 3 of Cybera’s Introduction to Cybersecurity series In our previous blog post, we talked about the importance of cybersecurity in the modern world, and the different kinds of โ€œthreatsโ€ and โ€œattacksโ€ institutions commonly face. Today, weโ€™ll review how best to understand your operational environment in order to determine your specific cybersecurity risks. Knowledge is

Step one of building cybersecurity: What do you Know? Read More ยป

Cyberaโ€™s Introduction to Cybersecurity Series

Part 1 – Introduction For cybersecurity to be effective within any organization, it needs to be addressed as a continual lifecycle. Every day, new attacks are developed, so existing methods to repel them must be refined and improved. Why is cybersecurity important? Cybersecurity matters to everyone, from governments and large corporations, to small businesses, individual

Cyberaโ€™s Introduction to Cybersecurity Series Read More ยป

What is cybersecurity?

Cybersecurityโ€ฆhow to eat an elephant one bite at a time Part 2 of Cybera’s Introduction to Cybersecurity series Cyberattacks are on the rise. According to the annual ITRC (Identity Theft Resource Center) Data Breach Report, there was a 68% increase in reported U.S. data compromises from 2020 -2021. Moreover, breaches related to cyberattacks represented more

What is cybersecurity? Read More ยป

Summer 2023 Newsletter

Barreling into summer At the halfway point in Cyberaโ€™s 2022-25 strategic plan, weโ€™re proud to say weโ€™ve accomplished over 70% of our goals (see below for more details). Also in this issue: our new corporate video, Cyber Summit early-bird tickets, SANS training discounts for education, and the latest from ShareIT. See below for more details!

Summer 2023 Newsletter Read More ยป