The ending of 2014 has highlighted many vulnerabilities, the most well-known being the Heartbleed and the Shellshock situations as well as the large scale data theft.
Today, companies and governments rely on well-distributed, complex and highly dynamic network architectures. As networks expand their perimeters, entry points are increased and hackers are constantly developing new ways to attack. Once the network perimeter have been tapped, it becomes difficult to fight against vulnerabilities, especially when hackers have installed and hidden malware on the that can remain dormant for long periods.
To anticipate these attacks and maintain a certain security level, the adoption of a continuous security model becomes crucial. A security model can monitor and analyze ongoing threats and alert emergency services.
However, the security models based on traditional client-server architectures are difficult and expensive to implement. Only Cloud oriented architectures, combined with powerful analytical resources can respond to the large scale problem of continued oversight. Companies struggle to find and retain the necessary resources.
Nevertheless, through the Cloud, continuous security can become a reality for many institutions as well as small and large businesses.
by Philippe Courtot, Qualys
- Tracing, not Tracking (by Army General (2S) Watin-Augouard, Founder of the FIC) Legal Issues
- The “right to be forgotten”, a relative right (by Army General (2S) Watin-Augouard, Founder of the FIC) Legal Issues
- Why cybersecurity is a human rights issue, and it is time to start treating it like one (by Deborah Brown & Anriette Esterhuysen, Association for progressive communications) Legal Issues
- EncroChat: Deciphering of the End-to-End Encryption Service Used by Criminals Cybercrime
- Preserving Digital Footprints and Cyber Resilience: Training the Swiss Police (by Sébastien JAQUIER, Deputy Head of ILCE) Cybercrime
- Ransomware in Six Questions (by the Ministerial Delegation to the Security Industries and the Fight Against Cyberthreats, French Ministry of the Interior) Cybercrime
Cyber risks management
- The great cybersecurity challenge (by William Lecat, General Secretariat for Investment) Cyber risks management
- RSSI/CISO: The “swiss army knife” of cybersecurity! (by Delphine Chevallier, DG, Thalia NeoMedia) Cyber risks management
- Presentation of the EBIOS Risk Manager method (by the EBIOS Club) Cyber risks management