Canada’s reliance on GPS and GNSS for critical infrastructure, defense, and economic operations is growing—but so are the threats of jamming and spoofing. As adversarial nations test electronic warfare capabilities, Canada remains without a coordinated national strategy to detect and mitigate these risks. With billions of dollars at stake, investing in GNSS protection is no longer optional—it’s essential. … Continue Reading
Security

Explainable AI: The Key to Unlocking Generative AI’s Potential
In a world increasingly captivated and transformed by artificial intelligence, the roles of Generative AI and Explainable AI have become pivotal. Yet, their true potential is unleashed only when these two powerful forces intersect. We aim to explore this crucial … Continue Reading

Continuous MFA powered by Explainable AI & the Zero Trust Journey
On November 2022, the U.S. Department of Defense published information regarding plans to shift its network to a “zero trust architecture” by 2027. In this Zero Trust Strategy and Roadmap document, the federal defense agency shared its goals about what … Continue Reading

Zighra Secures Canadian Coast Guard Contract to Pilot Explainable AI Solution for Enhanced Cybersecurity
Zighra Successfully Qualifies to Sell Directly to Government of Canada under Pathway to Commercialization Program … Continue Reading

Zighra Successfully Qualifies to Sell Directly to Government of Canada under Pathway to Commercialization Program
Zighra Successfully Qualifies to Sell Directly to Government of Canada under Pathway to Commercialization Program … Continue Reading

N-dimensional Authentication Takes Behavioral Biometrics to New Levels
With mobile fraud on the rise and the cyber world becoming a dangerous place for the uninitiated to wander around in, businesses relying on ecommerce and virtual transactions have a responsibility to ensure their less experienced customers are adequately protected. Traditional … Continue Reading

ADAPTIVE BEHAVIORAL BIOMETRICS A CRITICAL SECURITY LAYER
We are on the cusp of a global shift to change how we identify the individual. Smart devices including mobile phones, wearables and global access to cellular services have pushed biometrics as the new paradigm in user authentication and security … Continue Reading

HACKERS GET ACCESS TO SAMSUNG PHONES VIA MOBILE SECURITY FLAW
Mobile security researchers have discovered a security flaw in Samsung’s default keyboard on its smartphones which can be exploited by hackers to snoop around your phone. Hackers could potentially access the phone’s camera, read text messages, install apps and use the microphone to … Continue Reading

TIPS FOR MERCHANTS TO ADDRESS MOBILE COMMERCE FRAUD
In 2014, merchants experienced nearly twice the fraud rate in m-commerce versus e-commerce. A recent study from LexisNexis indicates that the most common types of fraud through mobile are identity theft, request for return or refund and international cross-border. The burden … Continue Reading

ADOPTING MOBILE PAYMENTS FOR RETAILERS
A recent study from LexisNexis indicates that half of all merchants surveyed believe that adopting mobile payments is necessary to stay competitive and 15% of those currently support mobile commerce transactions. Considering that over 75% of smartphone and tablet owners use their devices for shopping activities … Continue Reading