Search
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique





















Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

CYBER-SECURITY

ENISA

ENISA’s Executive Director, Udo Helmbrecht, gave a (...)

Next...

 

ENISA

ENISA’s Security Framework for Governmental Clouds (...)

Next...

 

ENISA

ENISA issues methodologies for the identification of (...)

Next...

 

ENISA

ENISA published the Threat Landscape and Good Practice (...)

Next...

 

ENISA

ENISA publishes a meta-framework and an online tool to (...)

Next...

 
CYBER-SECURITY

ENISA

ENISA releases its Annual Activity Report for 2014. The (...)

Next...

 

ENISA

ENISA’s Executive Director Udo Helmbrecht said: “Today (...)

Next...

 

ENISA

ENISA provides a single framework addressing the (...)

Next...

 

ENISA

ENISA has published a report providing guidelines on (...)

Next...

 

ENISA

ENISA’s publishes a new study - looking into the (...)

Next...

 

Cyber Security

In this new section you will find offers for CYBER (...)

Next...

 
PRIME TIME Service

White Paper CommScope: Designing Infrastructure for the Cloud

In cloud-based data centres, physical layer performance is paramount. Without a physical infrastructure that delivers all (...)

Next...

Outdated energy, water and transport Industrial Control Systems without sufficient cyber security controls require coordinated testing of capability at EU levels, says the EU’s cyber security Agency ENISA

Today, the EU’s cyber security Agency ENISA published a new report to give advice regarding the next steps towards coordinated (...)

Next...

From transparency to trust in the Cloud: EU Cyber security Agency ENISA advises how to implement incident reporting in cloud computing

ENISA underlines the importance of incident reporting in cloud computing, particularly in critical sectors, as a way to (...)

Next...

Feature

Opinion Friday 24 July
Shame on France: French Constitutional Council Widely Approves Surveillance Law!

By validating almost all surveillance measures provided in the Surveillance Law adopted on 25 June, the French Constitutional Council legalises (...)

Next...

Interviews Monday 20 July
Pierre Calais, Stormshield: Can you stay in charge of your security strategy while outsourcing the IS and ushering in its transition to the cloud? Yes you can!

Stormshield will be presenting its Stormshield Network Security solutions at the next Assises de la Sécurité. This new product range uses (...)

Next...

Malware Update Monday 20 July
Limor Kessem, Cybersecurity Evangelist, IBM: Dyre Malware Takes Summer Holiday in Spain

New Configuration of the Dyre Trojan Coming After 17 Spanish Banks

Next...

Special Reports Tuesday 14 July
International Survey Reveals Lack of BYOD Policies, Looming Privacy Concerns and Strong Preference for Separate Phone Numbers

tyntec, a telecom-web convergence company, issued the results of its international BYOD User Survey 2015 “Employees’ Choice for Mobility.” The (...)

Next...

Opinion Tuesday 14 July
Sue Trombley, Iron Mountain: How can brands rise to the challenge of Information Governance?

The data managed by organisations is set to increase by 76 per cent over the next 12 to 18 months[i]. This, coupled with emerging types of data, (...)

Next...

Opinion Tuesday 7 July
Philippe Boyon, Active Circle: The challenges of file management in a video production project

The video production cycle is undoubtedly a multifaceted process. It can involve a small team or a large one with extensive collaborative work; (...)

Next...

White Papers

Monday 2 January
Aberdeen Group - Sector Insight : Stronger authentication for small and mid-sized businesses

Small and Mid-sized Businesses (SMBs) athenticate their end-users primarily with passwords, in spite of the fact that passwords are less secure, inconvenient, and in fact more expensive than stronger forms of authentication. Compared to larger (...)

Next...

Tuesday 25 October
ISACA Guide Outlines Web Application Security Vulnerabilities and Strategies

The use of web applications has soared recently, due to the significant value they can add to enterprises by providing innovative ways to interact with customers. However, so have the dangers. Along with the benefits of these capabilities come (...)

Next...

See all articles

 Flux RSS