Close

Operational security

2017/02/14The Constant Evolution of Security Threats and the Need for a Paradigm Shift (By Ramyan Selvam, Juniper Networks)

Upending the traditional perspective on security is just the beginning … At a time when the cloud is proving so crucial, the network is emerging as more important than ever. Unfortunately, its opportunities for free access underlie cyberattacks. This scourge, spurred on by the mobile technology boom, has become one of the most serious risks that companies…

Read More

2017/01/19Cybersecurity: A Field Where an Alliance Makes a Difference (By Eric Monnoyer, INOP’s)

Large public and private organisations must have access to the best expertise to defend themselves against constantly developing cyber threats. This represents a real challenge for them. Companies’ success in digital transformation depends on their capacity to anticipate sources of risk, which constantly evolve under the impetus of technologies, related to strategy, operational implementation, configuration…

Read More

2017/01/17Evolution of BCP and crisis management to answer cyber threat (By Xavier Fauquet, Formind)

Introduction The typologies of recent cyber-attacks and the multiplication of attacks push BCP managers in coordination with SSI managers to review and adapt their BCP strategy and crisis management organization. Those changes aim in particular to answer the following questions: Does my BCP, which has been set up to mitigate major “classical” disaster, also respond…

Read More

2017/01/17Practice in Cyber Defence: A Key to Success Against Cyberattacks (By Vincent Riou, CEIS)

Companies and organisations must not only be aware of but also protect themselves against cyber threats, which may have disastrous consequences: tarnished image; financial losses; racketeering; theft of client data, patents or trade secrets; shutdown of an operation; or even major danger for populations if the attack targets sensitive infrastructure. On an initial level, awareness-raising…

Read More

2017/01/09Account hacks: the user or the company – who’s to blame? {By Mike Milner, CTO and Co-founder, IMMUNIO}

When people choose weak passwords and reuse those same passwords across a variety of websites, they bear some responsibility for the security breaches that impact them. Historically, this was where it stopped: if you got hacked, it was your fault. But as Account Takeover (ATO) attacks become more common and more damaging to companies and…

Read More