Search
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique





















Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

PRIME TIME Service

White Paper CommScope: Designing Infrastructure for the Cloud

In cloud-based data centres, physical layer performance is paramount. Without a physical infrastructure that delivers all (...)

Next...

Outdated energy, water and transport Industrial Control Systems without sufficient cyber security controls require coordinated testing of capability at EU levels, says the EU’s cyber security Agency ENISA

Today, the EU’s cyber security Agency ENISA published a new report to give advice regarding the next steps towards coordinated (...)

Next...

Feature

Special Reports Thursday 17 July
G DATA: Hotel safes - are they really safe?

This is the beginning of the holidays; a lot of people will travel during the next weeks and may stay in a hotel. The rooms are usually equipped (...)

Next...

Opinion Wednesday 16 July
Ulf Mattsson, CTO Protegrity: Data Security to Protect PCI Data Flow

There are innumerable ways that data thieves can attack and penetrate your network security. As the saying goes, it’s not if your systems will be (...)

Next...

Opinion Wednesday 16 July
Ulf Mattsson: The Past, Present, and Future of Big Data Security

While Apache Hadoop and the craze around Big Data have seemed to explode out into the market, there are still a lot more questions than answers (...)

Next...

Opinion Wednesday 9 July
David Phillips, product manager, Wick Hill: Securing Your Virtual Environment

So you have you a shiny new virtual environment up and running. You may have virtualised all your servers, so that your business-critical (...)

Next...

Opinion Wednesday 25 June
Tofino : Is BYOD Security Really Concerned with Safety – or Is It All About Control?

If you are a regular follower of this blog, you’ve probably noticed that I haven’t been writing much in the past few months. I have simply been too (...)

Next...

Malware Update Friday 6 June
Robert Lipovsky, ESET : Analyzes First Android File-Encrypting, TOR-enabled Ransomware

Last weekend saw the (somewhat anticipated) discovery of an interesting mobile trojan – the first spotting of a file-encrypting ransomware for (...)

Next...

White Papers

Monday 2 January
Aberdeen Group - Sector Insight : Stronger authentication for small and mid-sized businesses

Small and Mid-sized Businesses (SMBs) athenticate their end-users primarily with passwords, in spite of the fact that passwords are less secure, inconvenient, and in fact more expensive than stronger forms of authentication. Compared to larger (...)

Next...

Tuesday 25 October
ISACA Guide Outlines Web Application Security Vulnerabilities and Strategies

The use of web applications has soared recently, due to the significant value they can add to enterprises by providing innovative ways to interact with customers. However, so have the dangers. Along with the benefits of these capabilities come (...)

Next...

See all articles

 Flux RSS