• Français
  • English

Cyber risks management

2020/01/22Making Humans the Strong Link in the IS Defence Chain (by Cyril Bras, CISO, Grenoble-Alpes Métropole)

The panorama of cyberthreats put together by the European Union Agency for Cybersecurity (ENISA) in January 2019 (ENISA, 2019) firmly situates the end user as the primary target of cyber attackers. These attackers understand that humans are the weak link in the cybersecurity chain at the level of the individual, business and government. However, this weakness can conceivably…

Read More


Both our social and professional lives are becoming digital, with the rapid development of information technologies and their increased importance on a day-to-day basis. As a result of this digitalization process, individuals and organizations are connected to the concept of being online and carrying their professional and social needs on digital platforms. As such digital…

Read More

2019/07/25New version of the digital risk awareness kit of

On 13 June 2019, ACYMA launched a new version of the digital risk awareness kit of One year after the release of the first part of the kit, 5 new themes and 4 new formats are added to this new version. This tool was developed through months of collaboration between public institutions, private organisations and member associations of the…

Read More

2019/05/07Is the Human Resources Department in the Blind Spot of Cybersecurity? (by Jean-Christophe Le Toquin, Secretary to the FIC Advisory Board)

From FIC 2019[i] to PWC[ii] and Kaspersky[iii] —to mention only the most recent sources— it is now widely acknowledged that the techno-centric approach to cybersecurity has had its day. According to Deloitte[iv], 63% of security incidents within a company are linked to a malicious action or to an error made by an employee. It is therefore…

Read More

2019/04/08Attack on the domain name system: the priority is to protect your access

Last weekend, the media has widely communicated on the consequences of an unprecedented attack that targeted the domain names. Indeed, during the night of 22-23 February ICANN reported the large-scale attacks on the domain names: it is DNS hijacking. These attacks consist in “replacing the authorized servers addresses with addresses of machines controlled by the…

Read More

2019/02/18Benefits of DNS Service Locality, by Paul Vixie

Operating one’s own local DNS resolution servers is one of the simplest and lowest-cost things an IT administrator can do to monitor and protect applications, services, and users from potential risks. A non-networked computer is very rare now because most useful work involves data and services that are distributed across some kind of “internet” — that…

Read More