security perimeter

The new security perimeter for organizations

Slowly but surely, we are experiencing a radical change in the world of networks and access security. To illustrate this in a caricatured way, we are moving from a situation when an organization’s network was inside its walls and the Internet outside, to a situation where everything is based on the Internet, which is shared by all organizations’ networks. The networks of companies are now permanently installed in the Internet network via cloud infrastructures that go beyond the physical boundaries… Read More >>

Enjeux RH télétravail

HR issues of telework

While the democratization of telework concerns different departments within companies, Human Resources is probably, together with the IT Department, the department whose activity has been the most impacted by telework, with new HR issues arising from this digitalization of interactions. From 100% online recruitment processes to the need to maintain social contact between all employees remotely, and to manage the work/life balance, Human Resources must, more than ever, prove their ingenuity and rely on digital tools to support these new… Read More >>

usurpation d'identité

Identity theft: how to protect against it within companies?

Identity theft, which affects individuals in both personal and professional situations, is a threat whose impact is growing as the digital age expands in our lives. Although identity theft was not born with information technology, it is indeed the IT that has contributed to its expansion: on the one hand, more and more administrative procedures are carried out online, and on the other hand, our personal exchanges and confidential data are often poorly protected. Nevertheless, there are ways to protect… Read More >>

Biométrie comportementale

Behavioral biometrics: A new authentication factor which needs to develop

Still marginal today, behavioral biometrics is already revolutionizing paradigms and authentication methods. By strengthening the security of information systems and making authentication more comfortable for users, this new factor is essential in the dynamic context created by today’s technological evolution and society. Indeed, the traditional password is becoming increasingly obsolete and used alone, it does not guarantee a sufficient level of security. Multi-factor authentication responds to this issue, with a trend towards the use of factors inherent to the user… Read More >>

OIV OSE

What are the regulations for OVI and OES?

The multiplication of attacks and threats to organizations’ information systems has prompted the French government and the European Union to implement recommendations and rules for private companies and public administrations. The requirement level of these rules and recommendations varies according to the importance of the target organization. They are optional for organizations considered as non-sensitive, but, at different levels, mandatory for OVI (Operators of Vital Importance) and OES (Operators of Essential Services). Limiting the cyber risk of OVI and OES… Read More >>

démocratisation du télétravail

6 advantages of the democratization of telework

Still very limited a few years ago, telework has taken a drastic yet salutary step forward for the large number of organizations that have used it: in many cases, it was the only way to maintain the economic activity without putting employees at risk of health hazards. This forced democratization of telework has proved to be beneficial in this period of health crisis, but it will also be beneficial in the future and in a much broader context than just… Read More >>

Secure Access Service Edge

Secure Access Service Edge: A Paradigm Shift

The network and network security world is experiencing, like any other technology, its digital revolution. The traditional vision of “inside the firewall” and “outside the firewall” has been shattered: Internet has become the network of the extended enterprise. Secure Access Service Edge: Trends Leading to a Paradigm Shift Moving from a “network-centric” architecture to a “user-centric” and “application-centric” architecture. On the one hand, the cloud and the decentralization of servers and applications in disparate clouds; on the other hand, the… Read More >>

Covid-19 : les grands oubliés du télétravail

Covid-19: the forgotten side of teleworking

A few days ago, a survey conducted by Odoxa-Adviso Partners estimated that there are 5.1 million people teleworking in France during this period of covid-19 health crisis. This means that 3.3 million employees have the possibility to work remotely, in addition to the 1.8 million who already occasionally had this possibility before. This flexibility is excellent news for our economy because it allows us to maintain part of the nation’s productive force, and also to save a few billion in… Read More >>

rançongiciels

Ransomware, a cyber threat with an exponential curve

During the International Cybersecurity Forum (ICF) which took place on January 30, 2020, Guillaume POUPARD, the General Director of the National Cybersecurity Agency of France (ANSSI), mentioned the multiplicity of ransomware cyber attacks. On this subject, he also points out that “Hospitals, communities and administrations must be prepared to face the exponential curve of ransomwares”. What is a ransomware? A ransomware, also known as cryptolocker, is a malicious software that hijacks personal and/or confidential data of an individual or all… Read More >>

moindre privilège

Least privilege: a key principle for the security of the Information System

The least privilege principle consists in limiting the rights/authorizations of any individual on the information system to only those applications/data that are necessary for his missions. This principle appears in many guides relating to cybersecurity, in particular in documents published by the National Cybersecurity Agency of France – ANSSI (PA-022 – recommendations relating to the secure administration of information systems or PG-040 – recommendations for the implementation of system partitioning) or in the rules issued by the French MPL (Military… Read More >>