Migrations to Microsoft's Digital Workplace platform, Office 365, are well advanced, if not already completed. It is now time to improve processes, but above all, to secure them. Several topics must be addressed when securing Office 365 including the need…
In a previous article, we saw that the Smart City was inducing a paradigm shift which, combined with the general public's high expectations on the security of its data, required adapting the approach to such a project. Indeed, as the…
Cybercrime watch The most consequent Patch Tuesday in the history of Patch Tuesday On March, Tuesday 10th, Microsoft has released updates no less than security vulnerabilities, targeting either the Windows operating systems or associated software. 26 of these vulnerabilities are…
Today, nearly half of mankind is under a lockdown during an unprecedented health crisis. It is a situation that has not been seen for decades. It is also a different situation for everyone, depending on their geographical location, the composition…
Smart City, a possible answer to today's challenges "A smart sustainable city is an innovative city that uses information and communication technologies (ICTs) and other means to improve quality of life, efficiency of urban operation, and services and competitiveness, while…
Cybercrime watch Google Chrome's update fight against Cybercrime Google Chrome version 80 now supports AES-256 to user data stored locally. The change has made an impact on AZORult's ability to steal user's information. AZORult is a user profile malware that…
Le 1er avril 2018, la procédure d’agrément Hébergeur de Données de Santé, en vigueur depuis janvier 2006, a été remplacée par la certification Hébergeur de Données de Santé (HDS), incluant notamment une certification ISO 27001:2013. Quel bilan en tirer deux…
We have seen through the previous articles the solutions allowing to initiate the security of Industrial IS. Once this securing has been achieved, the maintenance in security conditions must be ensured as well as the implementation of detection means. Managing…
After having discovered the premises of securing Industrial IS through the mapping of these systems and their partitioning, we will now explain their administration. Administration – the nerve center of network architecture Good administration of an IS is essential…
Dans un précédent article, nous avons pu découvrir l’IAM of Things (IAMoT) et souligner les très fortes interactions avec les domaines de l’IAM et du Customer IAM (CIAM). Dans ce nouvel article, nous allons maintenant mettre en évidence les lacunes…