>>Editorial: What to remember from 2017? Industrial Control Systems (ICS) are complex systems that aim to control industrial processes. ICS can be found in several sectors: energy, nuclear, transport, chemistry… In brief these systems control many of the critical productive assets…
TOWARD INCREASINGLY DECENTRALIZED iss… In recent years, companies have faced an expansion in the scope of Identity and Access Management (IAM) activities. They no longer concentrate solely on user provisioning and authentication; focus has shifted toward both account review and…
Face à l’évolution des menaces visant les entreprises, les stratégies de défense s’efforcent en permanence de s’adapter à de nouveaux modes d’attaque. Au cœur de cette défense, les postes de travail et les serveurs représentent deux des plus grandes sources…
L’utilisation accrue d’objets sans-fil (téléphone, objet connecté, casque audio, télécommande, …) et la mise à disposition d’antennes bon marché favorisent l’étude des signaux radio. Les deux premiers articles de cette série visent à introduire les composants de la radio-logicielle (SDR)…
Firstly, let’s introduce what Records Management is: it is the management of data generated while doing business from generation to deletion. Your company might not have a Records Management department, let alone a Records Management policy, but it already does…
Introduction aux données de réplication de l’Active Directory Au sein d’un domaine Active Directory se trouvent généralement plusieurs contrôleurs de domaine qui nécessitent de disposer des mêmes informations. Pour parvenir à cela, l’Active Directory dispose d’un mécanisme de réplication qui…
Lors de la dernière édition de la DEFCON, nous avons présenté nos travaux de R&D concernant un protocole propriétaire Schneider à l’ICS Village, espace dédié à la sécurité des SI industriels. Vous pouvez retrouver notre intervention en vidéo : https://www.youtube.com/watch?v=A_B69Rifu1g Revenons…
Faced with increasingly insistent and advanced threats, Security Operations Centers (SOCs) must be able to detect security incidents as quickly as possible in order to be able to react ever more effectively. However, they are also facing increasingly stringent measures…
2017 has been quite a year for cybersecurity twists and turns overall. As every year, the number of incidents multiplied, regulations were reinforced and technologies evolved considerably. In this surge of news, what’ll be the key trends in 2018? Find…
On July 6, 2016, the NIS (Network and Information Security) directive went into effect. With only a short time to go until the deadline for transposition (May 9, 2018), discussions about the directive are picking up steam. But what exactly…