• Français
  • English


2015/02/17Risk management, IT security and cyber insurance must go hand in hand [by François Gratiolet, Business Digital Security Advisory]

The growing threat posed by cyber-­attacks, in conjunction with an increasing dependence on digital assets, has seen cyber security become a critical part of firm strategy. A company’s digital assets represent tremendous value, and the need to protect them is more critical than ever. The overall cyber insurance market is growing at great pace, with enterprise organizations…

Read More

2015/01/19[Policy paper] Cybercrime and social networks: Dangerous liaisons

It was via Twitter that hacktivist group Rex Mundi announced that it had published the customer database of the Domino’s Pizza chain, after months of racketeering. It was also on this social network that, on 2 December, the group of hackers Lizard Squad claimed that they had hacked into Microsoft’s Xbox Live network. Another case in…

Read More

2015/01/15The Sony Pictures Entertainment Case : The employees’ low-profile initiative

The employees of the North American subsidiary of Sony Picture Entertainment, whose personal data was divulged in mass quantity following the November 2004 cyber attack claimed by the hacktivist group “Guardians of Peace”, have initiated class-action suits against their North American employer for failure to secure its computer and database systems. These initiatives, although barely…

Read More

2015/01/12[Contribution] Why CerberHost? Because your sites are vulnerable… [by Emile Heitor, CTO, NBS Systems]

CerberHost protects from known threats and detects actions to create, find or exploit vulnerabilities of your Information System. Security is not a concept but a skill. About secure hosting? The original story of the hosting provider, NBS System, is closely linked to cybersecurity. In the mid-2000s, under the leadership of its customers, NBS System invested…

Read More

2015/01/12[Contribution] Closing the door to attackers with continued security and the Cloud [by Philippe Courtot, Qualys]

The ending of 2014 has highlighted many vulnerabilities, the most well-known being the Heartbleed and the Shellshock situations as well as the large scale data theft. Today, companies and governments rely on well-distributed, complex and highly dynamic network architectures. As networks expand their perimeters, entry points are increased and hackers are constantly developing new ways…

Read More