Welcome to our blog!

Here, you'll discover an indispensable source of information, analysis, opinions and news covering the world of cybersecurity.

At StreamScan, our commitment goes far beyond technological exploration. We dive deep into the real-world impact of cybersecurity on business, because we understand that this complex dynamic far transcends mere technology.

Join us for enriching discussions that illuminate the challenges and opportunities of modern cybersecurity.

Filter by category:


Radio Canada - Interview with Streamscan's Chief Cyber Security Officer on cyber-crime negotiation

2022-10-11T15:03:00

Radio Canada - Interview with Streamscan's Chief Cyber Security Officer on cyber-crime negotiation

A short Radio Canada capsule this morning in this month of cyber security awareness. Our expert Karim Ganame, PhD, GCIH, GCIA, CISSP was interviewed o
New critical security vulnerability in Fortinet firewall CVE-2022-40684 (CVSS score: 9.6)

2022-10-09T22:44:00

New critical security vulnerability in Fortinet firewall CVE-2022-40684 (CVSS score: 9.6)

A security vulnerability has been reported on Fortinet firewalls. The vulnerability number is CVE-2022-40684 and it has a score of 9.6 on a scale of 1
SOC vs MDR

2022-09-21T12:58:00

SOC vs MDR

SOC vs MDR When an organization wants to outsource its cybersecurity management, it usually has a choice between SOC and MDR. What is the SOC? The SOC
Implementation of Act 25 in Quebec

2022-09-13T13:21:00

Implementation of Act 25 in Quebec

Implementation of Act 25 in Quebec: welcome to the hacking jungle and the world of quadruple extortionOne of the paradoxes of cybersecurity is that ha
Compliance with Act 25: Monitoring your network is key

2022-09-12T18:40:00

Compliance with Act 25: Monitoring your network is key

Compliance with Act 25: Monitoring your network is key The new Act 25 (Law 64) on the protection of personal information comes into force on September
NDR vs EDR

2022-08-29T19:04:00

NDR vs EDR

NDR and EDR are emerging terminologies in cybersecurity. What are these tools used for? Does one replace the other? In this article, we will clarify t
NDR vs. SIEM

2022-08-16T18:49:00

NDR vs. SIEM

In the category of security tools to protect the network perimeter, 2 tools stand out. They are NDR (also known as IDS/IPS) and SIEM. They are often c
Legault refuses to leave TikTok despite security concerns

2022-08-05T15:49:00

Legault refuses to leave TikTok despite security concerns

In an article published by the Journal de Montréal, our CEO Dr. Karim Ganame explains about the presence of Prime Minister François Legault in the Chi
Pentests vs. Vulnerability scans

2022-08-02T14:58:00

Pentests vs. Vulnerability scans

Pentests vs. vulnerability scansIntrusion tests and vulnerability scans are 2 operational cybersecurity activities commonly practiced in organizations