Identité et sécurité Security

Identity and security

Security is a global issue.   The security approach has not changed much since Roman times. The idea behind defense-in-depth...

Read
The human face of the workplace

The human face of the workplace

A world without users? “Automation”, “DevOps”, “Robotic Process Automation” (RPA), bots, chatbots and other robots, “artificial intelligence” (AI), … According…

La gestion des identités dans les GHT

Identity management within Hospitals cluster

The GHT (Hospitals cluster in France), created by the Health Act 2016, bring together several hospitals in the same region in…

European Cybersecurity Act

European Cybersecurity Act : What certification process ?

In 2017, the European Commission published a series of initiatives to strengthen the EU’s resilience, deterrence and defense against cyber…

Zero Trust

Zero Trust, a modern and agile defense paradigm?

For those who are responsible for the management of a company’s IT infrastructure, it is quite clear that the moat…

les dangers du social login

The risks of Social Login

You have seen it before, or even already used it to connect to a website, the social login seduces because…

reasons to deploy SSO

6 reasons to deploy an SSO solution

The Single-Sign-On (SSO) allows users to access their applications by logging in only once. They then have access to all…

TISAX, a standard in the automotive industry

TISAX, a standard in the automotive industry

Based on the standard ISO 27001 and adapted to the requirements of the automotive field, the TISAX (Trusted Information Security…

évaluation sécurité

Move on, there’s nothing to see! or why “security by obscurity” is not a solution

We don’t know what’s hidden in the obscurity. David Lynch At the end of the 19th century, Auguste Kerckhoffs published…

Management of privileged accounts: 5 key recommendations to protect your Information System

The administration of the information system (IS) of companies and organizations are based on privileged accounts. Privileged accounts rely on…