Zero Trust

Zero Trust, a modern and agile defense paradigm?

For those who are responsible for the management of a company’s IT infrastructure, it is quite clear that the moat...

Read

Once upon a time in Cyberland

If the fool warns of a risk, run away. Teke proverb     In [01], I mentioned that the risk…

Ständige Authentifizierung in der Cyber-Welt

Continuous authentication in Cyberia

  Security is a matter of compromise, a balance between confidentiality and convenience, control and efficiency. While it would be…

Feedback on the ANSSI’s qualification of IPdiva Secure

One of the keys to securing the information system of an organization is to deploy security products. Because of their…

Cloudifying the uncloudifiable!

“My company’s apps are cloudifiable, super-cloudifiable in fact”. Unfortunately, repeating this phrase over and over is never going to result…