Close
  • Français
  • English

Operational security

Introduction 2020 – X.0 security has not solved the password issue. The “LCR Policy” (for minimum Length, Complexity, and Regular Renewal), intuitive though it may be, persists despite findings that challenge it. Have we measured its effectiveness? Given the findings, what are the solutions? And most importantly, what are the behavioural factors that contribute to…

Read More

What is ransomware? Ransomware is malicious software. Ransomware programs are computer viruses. These viruses block access to information systems or data stored on the victim’s computer or server, then demand that the victim pay a ransom to unblock said access, although it is never guaranteed that it will actually be unblocked.   Whom does ransomware…

Read More

In 2016, Vinci, a construction company, became the victim of a significant business email compromise (BEC)[1] attack. An email which appeared to come from Vinci’s communications director was sent to the news agency Bloomberg. The email claimed that Vinci’s finance director had resigned following the discovery of a black hole in their accounting. The email…

Read More

The issue of privacy arises in each of our interactions with digital platforms that collect and share user data, sometimes without explicit consent. The rise of machine learning is based on training collected data that may contain personal data, particularly in areas such as health or insurance. Once the models have been trained, there is…

Read More