Authentification continue

Continuous Authentication : When Behavioral Analysis Guarantees Your Identity

  Many authentication methods exist nowadays. The most well-known of them is by using the login/password pair. For a better...

Read
PAS - Plan d’Assurance Sécurité

PAM should not exclude SAP

Before starting to play a board game, it’s customary to read the game rules. As part of an outsourcing service,…

The Cleanroom concept for a safe and secure administration

A bastion is a military structure projecting outward from the wall of a fortress. In computer science, we can extrapolate…

Security is not an obstacle

I hurry to laugh at everything, for fear of having to cry about it. Pierre DAC There are three main…

Once upon a time in Cyberland

If the fool warns of a risk, run away. Teke proverb In [01], I mentioned that the risk can be…

Ständige Authentifizierung in der Cyber-Welt

Continuous authentication in Cyberia

Security is a matter of compromise, a balance between confidentiality and convenience, control and efficiency. While it would be easy…

I LOVE DSGVO

I LOVE GDPR ♥

Security is everyone’s concern. Edouard PHILIPPE Since 25 May 2018, the General Data Protection Regulation (GDPR) has been applied for…

Home Office

Telework: how to access your enterprise IS securely from home?

On my way to telework, I got telepunched for over speeding on the information highway… and it cost me a…

Soliloquy around a consistent monitoring approach

  Over the last few months, many articles in the specialized press or on various blogs have reported the increase…

In the age of artificial intelligence, nothing new… really?

The year 2017 was marked by numerous issues in the cyber domain. We can mention the successive ransomware waves but…

I'M RGPD

I AM GDPR

The EU’s General Data Protection Regulation (GDPR) intends to strengthen and unify personal data protection for all individuals within the…