Quantum computers have given rise to a raft of hopes and fears. Their computing capabilities could enable us to solve certain problems more quickly than today's computers, including those upon which modern cryptography is based. Does this mean that the…
Category: Cloud & Next-Gen IT Security
Recent major cyberattacks, especially global destructive ones such as WannaCry and NotPetya in 2017, but also targeted ones, have shown how significantly business activities can be disrupted for affected organisations, resulting in huge financial losses. Consequently, organisations are looking for…
Today, more than ever, data protection is one of the major challenges facing companies. Pressure in this area is mounting: increasing legislation (such as the GDPR), new requirements from regulators, rising cyber threats, the challenge of user awareness, and more.…
After several attempts to enact laws that facilitate the appropriation of data from customers of US-based services that is being stored outside the United States, the US Congress passed the “Clarifying Lawful Overseas Use of Data (CLOUD) Act” in March…
Plus de 30 start-ups et PME ont participé à la seconde édition des « Banking CyberSecurity Innovation Awards » (BCSIA) révélant ainsi le dynamisme de l'écosystème des start-ups cyber. L'enjeu pour ces dernières est désormais de réussir à convaincre les grands…
Data is the 21st century’s black gold: an observation you won’t be particularly surprised to hear. The fact that it is ever-more exposed (through the increasing use of APIs and SaaS applications such as Office365, Salesforce, Shadow IT, etc.) and…
Cybersecurity is no longer a topic just reserved for new technology fans and experts. Today, cyber-attacks make mainstream media headlines. All cyber-attacks make an impact on the company’s image and therefore on the trust conferred on it. In addition to…
TOWARD INCREASINGLY DECENTRALIZED iss… In recent years, companies have faced an expansion in the scope of Identity and Access Management (IAM) activities. They no longer concentrate solely on user provisioning and authentication; focus has shifted toward both account review and…
Face à l’évolution des menaces visant les entreprises, les stratégies de défense s’efforcent en permanence de s’adapter à de nouveaux modes d’attaque. Au cœur de cette défense, les postes de travail et les serveurs représentent deux des plus grandes sources…
Businesses are increasingly using cloud services (SaaS, PaaS, and IaaS) in their IT environments. They provide more flexibility on costs and can be more attractive than using conventional IT infrastructure. In 2016, in France, 48% of companies employing more than 250…