Resources

Blog

Discover our blog dedicated to cybersecurity and risk management! Explore the latest trends, practical tips, and innovative strategies to protect your data and strengthen your organization’s resilience against cyber threats.

Infostealers: the real risk comes from browser safes

Incidents involving infostealers remain underestimated. This malware directly targets password vaults built into browsers. It operates within the user session and frequently bypasses EDR detection. The issue is simple: in the event of a leak, you must report the incident to ANSSI…
ARTICLE

How can you pragmatically assess your cybersecurity?

The digitization of corporate working practices has accelerated since the Covid-19 crisis, amplifying a worrying shortage of cybersecurity professionals. While many organizations are investing in increasingly complex IT infrastructures, professionals capable of understanding the …
ARTICLE

What is ransomware and how can you protect yourself against it?

Ransomware is a type of malware that has become increasingly prevalent in the field of cybersecurity. This software encrypts an organization's data and demands a ransom in exchange for the decryption key. The aim is to make them inaccessible, thereby preventing people from worki…
ARTICLE

Cyber rating: for a trusted ecosystem: part 1

1 Ubiquitous risk, essential protection In 2016, if you asked a CISO what his day was made of, he would answer "Cloud", "Antivirus", "General Data Protection Regulation" or "connected objects". He would tell you about his fears of cyber-attacks and his company's lack of maturity,…
ARTICLE