A chaque première connexion sur un page web ou une application, la même question est posée : "En poursuivant votre navigation sur ce site, vous acceptez nos CGU et l'utilisation de cookies ?". Lors de leur navigation web ou utilisation…
Introduction La sérialisation consiste à transformer un objet applicatif en un format de données pouvant être restauré ultérieurement. Ce procédé est utilisé pour sauvegarder des objets ou les envoyer dans le cadre de communications. Exemple de sérialisation d'une variable…
Quantum computers have given rise to a raft of hopes and fears. Their computing capabilities could enable us to solve certain problems more quickly than today's computers, including those upon which modern cryptography is based. Does this mean that the…
As we’ve seen in the previous article, a serious consideration of "permissions" (also known as rights, authorizations, roles, and access profiles) should significantly reduce the risk of fraud and human error, and contribute to the company’s compliance with relevant legislation.…
Enterprise Resource Planning (ERP) applications support businesses’ most critical processes and workflows. As such, it carries many inherent risks—the main ones being internal fraud and human error. And statutory auditors, internal controllers, and auditors, are only too well aware of…
Avant l'existence du niveau fonctionnel Windows Server 2003, lorsqu'un utilisateur tentait de s'authentifier à l'aide d'un mot de passe n'étant pas le sien, son nombre de tentative d'authentification échouée (représenté par l'attribut "badPwdCount") se voyait automatiquement incrémentée. Depuis l'introduction du…
According to a Wavestone survey[1], as detailed in the study “protecting privacy in the digital age”, 94% of respondents believe that digital privacy is important and should be protected. This study also demonstrates that e-commerce sites, and even retailers in…
The number of cyber-attacks is increasing at an unprecedented rate with no two being the same. We sat down with Nick Prescot (Senior Manager, UK Cybersecurity practice) to discuss cyber crisis management and some key considerations to help C-level executives prepare for…
After the first article which covered "Extending the scope of detection to new perimeters” (see here), and the second, dedicated to “Enhancing detection through new approaches” (available here)... this is the conclusion to this (epic!) saga. This last installment will…
After the first article, which covered "Extending the scope of detection to new perimeters" (available here), this second installment is the next in our summer series about the SOC... Enhancing detection with new approaches Think identity to detect suspect…