Within any infrastructure or application, privileged accounts are particularly sensitive accounts. Securing them is a key issue. This is especially true for SaaS services, where the shared responsibility model requires an organization to protect its data and identities, and the…
Category: Cloud & Next-Gen IT Security
More than 60 startups and SMEs participated in the fourth edition of the Banking Innovation Awards (BIA), formerly the Banking CyberSecurity Innovation Awards (BCSIA). Cybersecurity, artificial intelligence and data are the key words of this startup contest organized each year…
We are now opening contributions to this blog to start-ups accelerated by our Shake'Up project. Hazy offers a synthetic data generator, combining differential confidentiality, referential integrity, multi-table database support and aerial deployment. Contingency planning. It’s what the few orgs that…
Recent events have shown us that teleworking is no longer a luxury for employees, but a real necessity to ensure the continuity of organisations' activities. For those who have not yet taken the plunge (mainly ETIs and the public sector),…
For several years now, Wavestone's different offices have been periodically identifying startups active in the field of cybersecurity. Wavestone Brussels office has therefore carried out its very first census in this field: the 2020 Belgian Cybersecurity Startup Radar. A proven…
In the previous article, we presented a step by step approach for Machine Learning applied to cybersecurity in order to use its value and understand how it works (lien vers partie 1 de l’article). In this second part, we will…
Nowadays, we hear about artificial intelligence (AI) everywhere, it affects all sectors... and cybersecurity is not to be left out! According to a global benchmark published by CapGemini in the summer of 2019, 69% of organizations consider that they will…
To say the least, cyber-resilience is a fashionable concept. The number of client requests on the topic has exploded this year: framing studies, program structuring, strategy definition, etc. Major accounts are currently multiplying initiatives. Paradoxically, the definition and scope of…
Nous vous en parlions dans un précédent article, la transformation numérique agile est en marche et ce nouveau modèle impose de totalement revoir sa manière d’intégrer la sécurité dans les projets. Nous allons découvrir dans cet article comment conduire un…
Migrations to Microsoft's Digital Workplace platform, Office 365, are well advanced, if not already completed. It is now time to improve processes, but above all, to secure them. Several topics must be addressed when securing Office 365 including the need…