Identité et sécurité Security

Identity and security

Security is a global issue.   The security approach has not changed much since Roman times. The idea behind defense-in-depth...

Read
The human face of the workplace

The human face of the workplace

A world without users? “Automation”, “DevOps”, “Robotic Process Automation” (RPA), bots, chatbots and other robots, “artificial intelligence” (AI), … According…

La gestion des identités dans les GHT

Identity management within Hospitals cluster

The GHT (Hospitals cluster in France), created by the Health Act 2016, bring together several hospitals in the same region in…

SMSI

The value of an Information Security Management System for an organization

A risk manager should always assume that the list of risks considered, however extensive, is incomplete. Douglas W. Hubbard ISO…

PAS - Plan D'Assurance Sécurité

PAM should not exclude SAP

Before starting to play a board game, it’s customary to read the game rules. As part of an outsourcing service,…

The Cleanroom concept for a safe and secure administration

A bastion is a military structure projecting outward from the wall of a fortress. In computer science, we can extrapolate…

Security is not an obstacle

I hurry to laugh at everything, for fear of having to cry about it. Pierre DAC There are three main…

Once upon a time in Cyberland

If the fool warns of a risk, run away. Teke proverb In [01], I mentioned that the risk can be…

Ständige Authentifizierung in der Cyber-Welt

Continuous authentication in Cyberia

Security is a matter of compromise, a balance between confidentiality and convenience, control and efficiency. While it would be easy…

I'M RGPD

I AM GDPR

The EU’s General Data Protection Regulation (GDPR) intends to strengthen and unify personal data protection for all individuals within the…