"Where Security Meets Serenity. With Klavan by our side, we've fortified not just our systems, but our peace of mind. It's not just about protection, it's about profound reassurance."
- Ethan S., Chief Operations Officer (COO)


Good Will Hacking: The Good-Faith Security Researcher’s Dilemma in Canada and Beyond
Cybersecurity has never been more critical, with governments worldwide scrambling to protect sensitive infrastructure, safeguard privacy, and counter cyber threats. However, when it comes to good-faith security research—the practice of probing systems for vulnerabilities to improve security—the legal landscape is a mixed bag.
Here’s a deep dive into how Canada, the U.S., and Europe approach good-faith security research, through the lens of Bill C-26, Loi 25, and other global policies.




BSides Ottawa 2024: Data Breaches and Dark Secrets: The Corporate Side
"Data Breaches and Dark Secrets," where I share my journey as a security researcher tracking cybercriminals and ransomware gangs. We'll discuss the challenges of helping organizations and victims, the need for accountability, and the aggressive tactics used to silence ethical hackers.








Physical and Cyber Security Checklist tailored specifically for SMBs
Physical and Cyber Security Checklist for SMBs

Operational Technology used by the Royal Canadian Mounted Police - RCMP
Operational Technologies used by Law Enforcement


Protecting SaaS Organizations from Emerging Threats
Protecting SaaS Organizations from Emerging Threats: A Look at Attack Techniques and Klavan Security’s Solutions



Tech Spy Stuff - Covert, Clandestine and Close Access Operations
In this thought-provoking episode of Shadow Tactics, we dive deep into the world of covert and clandestine operations, with a special focus on the intricacies of close access missions. Drawing from personal experience and professional expertise, we explore the critical differences between covert and clandestine operations, their strategic importance, and the high-stakes environment they operate in. From the challenges of physical proximity to the advanced planning required, we unravel the complexities of these secretive missions.