We talked about it in a previous article, the agile digital transformation is on the way and this new model requires a total rethinking of the way security is integrated into projects. In this article, we will discover how to…
Tag: cybersecurity
After many twists and turns in the year 2020, one thing is certain: the future does not wait. Today, the major challenge of cybersecurity lies essentially in the training of employees. Human error is involved in more than 90% of…
Machine Learning is an emerging topic in recent years, particularly in the context of cyber security monitoring. However, as mentioned in the article "Boost your Cybersecurity thanks to Machine Learning" (Part 1 & Part 2), the development of such solutions…
Nostalgia, nostalgia... remember security organizations 20 years ago. It couldn't be simpler! The "typical" team was made up of about fifteen people in the ISD operations, all of them passionate about technology: it caused a lot of VLAN, Internet filtering,…
We are now opening contributions to this blog to start-ups accelerated by our Shake'Up project. Hazy offers a synthetic data generator, combining differential confidentiality, referential integrity, multi-table database support and aerial deployment. Contingency planning. It’s what the few orgs that…
For several years now, Wavestone's different offices have been periodically identifying startups active in the field of cybersecurity. Wavestone Brussels office has therefore carried out its very first census in this field: the 2020 Belgian Cybersecurity Startup Radar. A proven…
Cybercrime watch Google Chrome's update fight against Cybercrime Google Chrome version 80 now supports AES-256 to user data stored locally. The change has made an impact on AZORult's ability to steal user's information. AZORult is a user profile malware that…
We have seen through the previous articles the solutions allowing to initiate the security of Industrial IS. Once this securing has been achieved, the maintenance in security conditions must be ensured as well as the implementation of detection means. Managing…
After having discovered the premises of securing Industrial IS through the mapping of these systems and their partitioning, we will now explain their administration. Administration – the nerve center of network architecture Good administration of an IS is essential…
Since 2015, along with the digital transformation, we have seen the Digital and Modern Workplace topic taking a growing place. As a result, Microsoft Office 365 established itself as the leader on the French market (nearly 90% of the CAC…