reasons to deploy SSO

6 reasons to deploy an SSO solution

The Single-Sign-On (SSO) allows users to access their applications by logging in only once. They then have access to all...

Read
TISAX, a standard in the automotive industry

TISAX, a standard in the automotive industry

Based on the standard ISO 27001 and adapted to the requirements of the automotive field, the TISAX (Trusted Information Security…

évaluation sécurité

Move on, there’s nothing to see! or why “security by obscurity” is not a solution

We don’t know what’s hidden in the obscurity. David Lynch At the end of the 19th century, Auguste Kerckhoffs published…

Management of privileged accounts: 5 key recommendations to protect your Information System

The administration of the information system (IS) of companies and organizations are based on privileged accounts. Privileged accounts rely on…

externalisation de l'administration de son SI

Should you outsource the administration of the Information System?

As mentioned in some of my articles ([01], [02]), IT security is not an option and must be a strategic…

PAS - Plan D'Assurance Sécurité

PAM should not exclude SAP

Before starting to play a board game, it’s customary to read the game rules. As part of an outsourcing service,…

The Cleanroom concept for a safe and secure administration

A bastion is a military structure projecting outward from the wall of a fortress. In computer science, we can extrapolate…

Security is not an obstacle

I hurry to laugh at everything, for fear of having to cry about it. Pierre DAC   There are three…

Once upon a time in Cyberland

If the fool warns of a risk, run away. Teke proverb     In [01], I mentioned that the risk…

Continuous authentication in Cyberia

  Security is a matter of compromise, a balance between confidentiality and convenience, control and efficiency. While it would be…