Continuous authentication in Cyberia

  Security is a matter of compromise, a balance between confidentiality and convenience, control and efficiency. While it would be...

Read

I LOVE GDPR ♥

Security is everyone’s concern. Edouard PHILIPPE   Since 25 May 2018, the General Data Protection Regulation has been applied for…

Telework: how to access your enterprise IS securely from home?

On my way to telework, I got telepunched for over speeding on the information highway… and it cost me a…

Soliloquy around a consistent monitoring approach

  Over the last few months, many articles in the specialized press or on various blogs have reported the increase…

In the age of artificial intelligence, nothing new… really?

The year 2017 was marked by numerous issues in the cyber domain. We can mention the successive ransomware waves but…

IAM GDPR

  The EU’s General Data Protection Regulation (GDPR) intends to strengthen and unify personal data protection for all individuals within…

Feedback on the ANSSI’s qualification of IPdiva Secure

One of the keys to securing the information system of an organization is to deploy security products. Because of their…

How to secure IT administrators’ desktops?

The weakest link in a chain is the strongest because it can break it. Stanislaw Jerzy Lec   Information Systems…

Of Machine Learning and Application Virtualization

Machine Learning is nowadays one of the most common expressions in literature, but the fields of application are so vast…

The History of Uberization

The usage of the word “uberize” should be a source of endless amusement for contemporary wordsmith. Today, any new product,…