Soliloquy around a consistent monitoring approach

Over the last few months, many articles in the specialized press or on various blogs have reported the increase of cyber attacks. Indeed, in 2017, it was noted that attacks in the cyber domain have increased by more than 20%. It is clear that, for any organization, the security of information systems must be considered as a capital issue of governance, or even survival in certain situations. In a previous interview, I have already had the opportunity to say that,… Read More >>

I'M RGPD

I AM GDPR

The EU’s General Data Protection Regulation (GDPR) intends to strengthen and unify personal data protection for all individuals within the European Union. This regulation imposes totally new requirements on how organizations must process such data, which means that companies must step up their efforts in information security management and associated investments. It is important to specify that the regulation (which is already in force, only the application of sanctions is postponed until March 2018) is binding for all companies, European… Read More >>

Feedback on the ANSSI’s qualification of IPdiva Secure, now Systancia Gate

One of the keys to securing the information system of an organization is to deploy security products. Because of their importance in the security system, it is essential to have confidence in these products. Confidence refers to the idea that you can trust someone or something. The best way to measure confidence in a security product is to have a security evaluation, conducted by a recognized and independent body in order to “validate” the response to a specific problem. IPdiva… Read More >>

Wie kann man das Desktop des IT-Administrators sichern?

How to secure IT administrators’ desktops?

The weakest link in a chain is the strongest because it can break it. Stanislaw Jerzy Lec Information Systems (IS) have developed considerably and are constantly progressing. The Information Systems Security is crucial from an economic and State standpoint, and even from a personal perspective. However, the Information Systems Security is based mainly on its weakest link, which is also the essential element: the human. The administrator who has a power and a very strong responsibility is no exception to… Read More >>