After several attempts to enact laws that facilitate the appropriation of data from customers of US-based services that is being stored outside the United States, the US Congress passed the “Clarifying Lawful Overseas Use of Data (CLOUD) Act” in March…
Category: Cloud & Next-Gen IT Security
Plus de 30 start-ups et PME ont participé à la seconde édition des « Banking CyberSecurity Innovation Awards » (BCSIA) révélant ainsi le dynamisme de l'écosystème des start-ups cyber. L'enjeu pour ces dernières est désormais de réussir à convaincre les grands…
Data is the 21st century’s black gold: an observation you won’t be particularly surprised to hear. The fact that it is ever-more exposed (through the increasing use of APIs and SaaS applications such as Office365, Salesforce, Shadow IT, etc.) and…
Cybersecurity is no longer a topic just reserved for new technology fans and experts. Today, cyber-attacks make mainstream media headlines. All cyber-attacks make an impact on the company’s image and therefore on the trust conferred on it. In addition to…
TOWARD INCREASINGLY DECENTRALIZED iss… In recent years, companies have faced an expansion in the scope of Identity and Access Management (IAM) activities. They no longer concentrate solely on user provisioning and authentication; focus has shifted toward both account review and…
Face à l’évolution des menaces visant les entreprises, les stratégies de défense s’efforcent en permanence de s’adapter à de nouveaux modes d’attaque. Au cœur de cette défense, les postes de travail et les serveurs représentent deux des plus grandes sources…
Businesses are increasingly using cloud services (SaaS, PaaS, and IaaS) in their IT environments. They provide more flexibility on costs and can be more attractive than using conventional IT infrastructure. In 2016, in France, 48% of companies employing more than 250…
Learn more on http://bit.ly/wavestone-cyber-resilience
The first article was about vulnerabilities in Business Continuity Plans (BCP) and an overview on recent major cyber attacks that paralyzed a significant amount of an Information System (IS). This second article introduces some leads and means to improve cyber-resilience…
Successive cyber attacks, Wannacry and NotPetya, have highlighted the limits of current resilience and business continuity plans, as well as the full capacity of cyberthreats to cripple Information Systems. The affected organizations paid a high price. What can we learn?…