A data leak refers to the unauthorized disclosure of personal or sensitive information belonging to an organization or its users. These disclosures can involve millions of records, including personal data such as social security numbers, contact details, or other confidential inf…
ARTICLE
In a context where digital exchanges are at the core of business processes, securing application traffic and APIs is no longer optional but an operational requirement.
This article explains to CISOs, CIOs, and security leaders why the TLS protocol and strict management of X.509 c…
ARTICLE
Pentest vs EASM: how effective are they at detecting cyber vulnerabilities?
Faced with growing cyber risks, CISOs are looking to improve the detection of threats to their information systems. Analysis of the [external attack surface (EASM)](https://www.boardofcyber.io/ressources/…
ARTICLE
2 Distrustful companies, uneven solutions
While a growing number of companies of all sizes have understood the importance of a controlled cyber rating, some still perceive it as an intrusion.... Julien Steunou, Associate Director - SOC CERT CWATCH at Almond, a Board Of Cyber part…
ARTICLE
1 Ubiquitous risk, essential protection
In 2016, if you asked a CISO what his day was made of, he would answer "Cloud", "Antivirus", "General Data Protection Regulation" or "connected objects". He would tell you about his fears of cyber-attacks and his company's lack of maturity,…
ARTICLE
The number of cyber incidents handled by ANSSI fell by 20% in 2022; however, the threat to local authorities remains as strong as ever. Quite the contrary: during the presentation of the latest cyber threat overview, the new director of ANSSI (January 2023), Vincent Strubel, indi…
ARTICLE