externalisation de l'administration de son SI

Should you outsource the administration of the Information System?

As mentioned in some of my articles ([01], [02]), IT security is not an option and must be a strategic...

Read
PAS - Plan D'Assurance Sécurité

PAM should not exclude SAP

Before starting to play a board game, it’s customary to read the game rules. As part of an outsourcing service,…

The Cleanroom concept for a safe and secure administration

A bastion is a military structure projecting outward from the wall of a fortress. In computer science, we can extrapolate…

Security is not an obstacle

I hurry to laugh at everything, for fear of having to cry about it. Pierre DAC   There are three…

Once upon a time in Cyberland

If the fool warns of a risk, run away. Teke proverb     In [01], I mentioned that the risk…

Continuous authentication in Cyberia

  Security is a matter of compromise, a balance between confidentiality and convenience, control and efficiency. While it would be…

I LOVE GDPR ♥

Security is everyone’s concern. Edouard PHILIPPE   Since 25 May 2018, the General Data Protection Regulation (GDPR) has been applied…

Telework: how to access your enterprise IS securely from home?

On my way to telework, I got telepunched for over speeding on the information highway… and it cost me a…

Soliloquy around a consistent monitoring approach

  Over the last few months, many articles in the specialized press or on various blogs have reported the increase…

In the age of artificial intelligence, nothing new… really?

The year 2017 was marked by numerous issues in the cyber domain. We can mention the successive ransomware waves but…