Wavestone and Sigfox share a common passion for tech, innovation and security. Our discussions led us to explore the foundation of all cybersecurity initiatives (the risk analysis), why this is different for an IoT project and, most importantly, how you…
Tag: cybersecurity
Monthly indicators TOP ATTACK The massive SolarWind hack Russian SVR Hackers have been romping through some 18,000 of SolarsWinds' Origin customer servers using the SUNBURST malware installed via a backdoored update server. FireEye, Microsoft and GoDaddy believe the avsvmcloud domain…
Monthly indicators TOP ATTACK Brazilian government recovers from "worst-ever" cyberattack After suffering the most severe cyberattack ever orchestrated against a Brazilian public sector institution on the 3rd , the Superior Electoral Court (STJ, in the Portuguese acronym) has managed to…
In a previous article, we shared an initial analysis of the dynamics of the cyber security startup ecosystem in France. The panorama of startups remains constant, with newly created startups already showing great promise. Others, with already several years of…
Towards realization despite adversity? Last year marked the beginning of the French cybersecurity startups ecosystem transformation. This year, many questions are being asked: has the momentum continued despite the health crisis? How has the ecosystem responded? What actions would support it…
We talked about it in a previous article, the agile digital transformation is on the way and this new model requires a total rethinking of the way security is integrated into projects. In this article, we will discover how to…
After many twists and turns in the year 2020, one thing is certain: the future does not wait. Today, the major challenge of cybersecurity lies essentially in the training of employees. Human error is involved in more than 90% of…
Machine Learning is an emerging topic in recent years, particularly in the context of cyber security monitoring. However, as mentioned in the article "Boost your Cybersecurity thanks to Machine Learning" (Part 1 & Part 2), the development of such solutions…
Nostalgia, nostalgia... remember security organizations 20 years ago. It couldn't be simpler! The "typical" team was made up of about fifteen people in the ISD operations, all of them passionate about technology: it caused a lot of VLAN, Internet filtering,…
We are now opening contributions to this blog to start-ups accelerated by our Shake'Up project. Hazy offers a synthetic data generator, combining differential confidentiality, referential integrity, multi-table database support and aerial deployment. Contingency planning. It’s what the few orgs that…