les dangers du social login

The risks of Social Login

You have seen it before, or even already used it to connect to a website, the social login seduces because...

Read

Security is not an obstacle

I hurry to laugh at everything, for fear of having to cry about it. Pierre DAC   There are three…

Once upon a time in Cyberland

If the fool warns of a risk, run away. Teke proverb     In [01], I mentioned that the risk…

Ständige Authentifizierung in der Cyber-Welt

Continuous authentication in Cyberia

  Security is a matter of compromise, a balance between confidentiality and convenience, control and efficiency. While it would be…

I LOVE DSGVO

I LOVE GDPR ♥

Security is everyone’s concern. Edouard PHILIPPE   Since 25 May 2018, the General Data Protection Regulation (GDPR) has been applied…

Home Office

Telework: how to access your enterprise IS securely from home?

On my way to telework, I got telepunched for over speeding on the information highway… and it cost me a…

Soliloquy around a consistent monitoring approach

  Over the last few months, many articles in the specialized press or on various blogs have reported the increase…

In the age of artificial intelligence, nothing new… really?

The year 2017 was marked by numerous issues in the cyber domain. We can mention the successive ransomware waves but…

I'M RGPD

I AM GDPR

The EU’s General Data Protection Regulation (GDPR) intends to strengthen and unify personal data protection for all individuals within the…

Feedback on the ANSSI’s qualification of IPdiva Secure

One of the keys to securing the information system of an organization is to deploy security products. Because of their…

Wie kann man das Desktop des IT-Administrators sichern?

How to secure IT administrators’ desktops?

The weakest link in a chain is the strongest because it can break it. Stanislaw Jerzy Lec   Information Systems…