Alibaba pushes ahead in US with AI agent despite tariff headwinds | Trump hosts tech CEOs at the new White House Rose Garden | Seek accuses Employment Hero of misusing data to lure new customers

Alibaba pushes ahead in US with AI agent despite tariff headwinds | Trump hosts tech CEOs at the new White House Rose Garden | Seek accuses Employment Hero of misusing data to lure new customers Summary Three concise tech-policy stories from the Daily Cyber & Tech Digest: Alibaba.com is stepping up engagement with US buyers […]

Read More →

Email security best practices (ITSM.60.002) – Canadian Centre for Cyber Security

Email security best practices (ITSM.60.002) – Canadian Centre for Cyber Security Summary This Cyber Centre guidance (effective 12 August 2025) summarises practical, organisation-level email security measures to protect confidentiality, integrity and availability of communications and data. It explains common threats (phishing, spoofing, malware, business email compromise, impersonation, data exfiltration and spam), details key protocols (TLS, […]

Read More →

Services and tools catalogue for critical infrastructure – Canadian Centre for Cyber Security

Services and tools catalogue for critical infrastructure – Canadian Centre for Cyber Security Summary The Canadian Centre for Cyber Security (the Cyber Centre) publishes a consolidated catalogue of services, tools and programmes aimed at strengthening cyber resilience across Canada’s critical infrastructure (CI) sectors. The catalogue explains how organisations can onboard with the Cyber Centre, the […]

Read More →

Joint guidance on a shared vision of software bill of materials for cyber security – Canadian Centre for Cyber Security

Joint guidance on a shared vision of software bill of materials for cyber security – Canadian Centre for Cyber Security Summary The Canadian Centre for Cyber Security, together with the US Cybersecurity and Infrastructure Security Agency (CISA) and international partners, has published joint guidance promoting a shared vision for Software Bill of Materials (SBOM) in […]

Read More →

Joint cyber security advisory on worldwide network compromises by People’s Republic of China state-sponsored actors – Canadian Centre for Cyber Security

Joint cyber security advisory on worldwide network compromises by People’s Republic of China state-sponsored actors – Canadian Centre for Cyber Security Summary The Canadian Centre for Cyber Security, working with the US National Security Agency and international partners, has issued a joint advisory about widespread network compromises by PRC state-sponsored actors. The advisory warns these […]

Read More →

Cyber security best practices for managing email (ITSAP.60.002) – Canadian Centre for Cyber Security

Cyber security best practices for managing email (ITSAP.60.002) – Canadian Centre for Cyber Security Summary This guidance from the Canadian Centre for Cyber Security explains core email security risks and practical steps organisations and employees should take to reduce those risks. It covers common threats — impersonation and spoofing, confidentiality and integrity compromises, availability/DoS attacks […]

Read More →

Universal plug and play (ITSAP.00.008) – Canadian Centre for Cyber Security

Universal plug and play (ITSAP.00.008) – Canadian Centre for Cyber Security Summary Universal Plug and Play (UPnP) is a protocol that lets devices on the same local network automatically discover and interact with one another — examples include mobile devices, smart speakers, TVs, cameras, gaming consoles, printers and routers. While convenient for media streaming, remote […]

Read More →

Virtualising your infrastructure (ITSAP.70.011) – Canadian Centre for Cyber Security

Virtualising your infrastructure (ITSAP.70.011) – Canadian Centre for Cyber Security Summary This guidance explains the fundamentals of virtualisation: what it is, how it works (virtual machines, hypervisors and hardware), the common types (server, desktop, storage, network, application and cloud), plus expected benefits and practical risks. It outlines what to look for in a hypervisor vendor […]

Read More →