SMSI

The value of an Information Security Management System for an organization

A risk manager should always assume that the list of risks considered, however extensive, is incomplete. Douglas W. Hubbard ISO...

Read
PAS - Plan D'Assurance Sécurité

PAM should not exclude SAP

Before starting to play a board game, it’s customary to read the game rules. As part of an outsourcing service,…

The Cleanroom concept for a safe and secure administration

A bastion is a military structure projecting outward from the wall of a fortress. In computer science, we can extrapolate…

Security is not an obstacle

I hurry to laugh at everything, for fear of having to cry about it. Pierre DAC   There are three…

Once upon a time in Cyberland

If the fool warns of a risk, run away. Teke proverb     In [01], I mentioned that the risk…

Ständige Authentifizierung in der Cyber-Welt

Continuous authentication in Cyberia

  Security is a matter of compromise, a balance between confidentiality and convenience, control and efficiency. While it would be…

I'M RGPD

I AM GDPR

The EU’s General Data Protection Regulation (GDPR) intends to strengthen and unify personal data protection for all individuals within the…

Feedback on the ANSSI’s qualification of IPdiva Secure

One of the keys to securing the information system of an organization is to deploy security products. Because of their…

Wie kann man das Desktop des IT-Administrators sichern?

How to secure IT administrators’ desktops?

The weakest link in a chain is the strongest because it can break it. Stanislaw Jerzy Lec   Information Systems…

Cloudifying the uncloudifiable!

“My company’s apps are cloudifiable, super-cloudifiable in fact”. Unfortunately, repeating this phrase over and over is never going to result…