Cybersecurity: a cost that generates savings

Cybersecurity: a cost that generates savings

For organizations, the deployment of cybersecurity solutions represents a significant and yet essential cost. The challenge is to avoid cyber...

Read
Password vault

Password vault : its potential for cybersecurity

  Are you one of the 83% of Internet users who use the same credentials for several sites? If the…

La pierre de Rosette de la gestion et la gouvernance des identités (IGA)

The Rosetta Stone of Identity Management and Governance

Identity and Governance Administration (IGA) is commonly defined as a centralized orchestration, through the application of security policies, identity management…

Identité et sécurité Security

Identity and security

Security is a global issue.   The security approach has not changed much since Roman times. The idea behind defense-in-depth…

The human face of the workplace

The human face of the workplace

A world without users? “Automation”, “DevOps”, “Robotic Process Automation” (RPA), bots, chatbots and other robots, “artificial intelligence” (AI), … According…

La gestion des identités dans les GHT

Identity management within Hospitals cluster

The GHT (Hospitals cluster in France), created by the Health Act 2016, bring together several hospitals in the same region in…

European Cybersecurity Act

European Cybersecurity Act : What certification process ?

In 2017, the European Commission published a series of initiatives to strengthen the EU’s resilience, deterrence and defense against cyber…

Cybersecurity Act

Cybersecurity Act : What’s going to change?

After being approved by the European Parliament on March 12, 2019, the Cybersecurity Act was finally adopted after its publication…

Zero Trust

Zero Trust, a modern and agile defense paradigm?

For those who are responsible for the management of a company’s IT infrastructure, it is quite clear that the moat…

les dangers du social login

The risks of Social Login

You have seen it before, or even already used it to connect to a website, the social login seduces because…