Today, nearly half of mankind is under a lockdown during an unprecedented health crisis. It is a situation that has not been seen for decades. It is also a different situation for everyone, depending on their geographical location, the composition…
Category: Sections
Smart City, a possible answer to today's challenges "A smart sustainable city is an innovative city that uses information and communication technologies (ICTs) and other means to improve quality of life, efficiency of urban operation, and services and competitiveness, while…
Cybercrime watch Google Chrome's update fight against Cybercrime Google Chrome version 80 now supports AES-256 to user data stored locally. The change has made an impact on AZORult's ability to steal user's information. AZORult is a user profile malware that…
Le 1er avril 2018, la procédure d’agrément Hébergeur de Données de Santé, en vigueur depuis janvier 2006, a été remplacée par la certification Hébergeur de Données de Santé (HDS), incluant notamment une certification ISO 27001:2013. Quel bilan en tirer deux…
We have seen through the previous articles the solutions allowing to initiate the security of Industrial IS. Once this securing has been achieved, the maintenance in security conditions must be ensured as well as the implementation of detection means. Managing…
After having discovered the premises of securing Industrial IS through the mapping of these systems and their partitioning, we will now explain their administration. Administration – the nerve center of network architecture Good administration of an IS is essential…
Dans un précédent article, nous avons pu découvrir l’IAM of Things (IAMoT) et souligner les très fortes interactions avec les domaines de l’IAM et du Customer IAM (CIAM). Dans ce nouvel article, nous allons maintenant mettre en évidence les lacunes…
For several years now, we’ve been supporting the far-reaching changes affecting industrial information systems which are being increasingly forced to open up to the broader market and corporate IS technologies. As levels of exposure and threats increase, carrying out security…
Search engines, such as public ones like Google or companies’ internal intranet search tools, are typically used so one can find information about a topic that they are interested in. However, a more nefarious way to use these tools has…
The workstation remains one of the favorite targets during Red Team operations. However, its security level has drastically increased with security solutions such as Bitlocker or LAPS. Can these improvements introduce new attack paths? In this article we will…