Blog : Tous les articles

How can you pragmatically assess your cybersecurity?

The digitization of corporate working practices has accelerated since the Covid-19 crisis, amplifying a worrying shortage of cybersecurity professionals. While many organizations are investing in increasingly complex IT infrastructures, professionals capable of understanding the …
ARTICLE

Data leaks: understanding and preventing data leaks in businesses

A data leak refers to the unauthorized disclosure of personal or sensitive information belonging to an organization or its users. These disclosures can involve millions of records, including personal data such as social security numbers, contact details, or other confidential inf…
ARTICLE

Facilitating the role of the CISO

In a world where cyber threats are increasingly frequent and sophisticated, the role of the Chief Information Security Officer (CISO) has become essential to protect organizations. Working closely with the Chief Information Officer (CIO), they ensure that security requirements ar…
ARTICLE

Infostealers: the real risk comes from browser safes

Incidents involving infostealers remain underestimated. This malware directly targets password vaults built into browsers. It operates within the user session and frequently bypasses EDR detection. The issue is simple: in the event of a leak, you must report the incident to ANSSI…
ARTICLE

Cyber rating: for a trusted ecosystem: part 1

1 Ubiquitous risk, essential protection In 2016, if you asked a CISO what his day was made of, he would answer "Cloud", "Antivirus", "General Data Protection Regulation" or "connected objects". He would tell you about his fears of cyber-attacks and his company's lack of maturity,…
ARTICLE

Cyber rating: for a trusted ecosystem: part 2

2 Distrustful companies, uneven solutions While a growing number of companies of all sizes have understood the importance of a controlled cyber rating, some still perceive it as an intrusion.... Julien Steunou, Associate Director - SOC CERT CWATCH at Almond, a Board Of Cyber part…
ARTICLE

Cyber rating: for a trusted ecosystem: part 3

3 Security Rating®, the answer from Board of Cyber For a company, the added value of a reliable, controlled cyber rating is significant. As Julien Steunou, Associate Director - SOC CERT CWATCH at Almond, a Board Of Cyber partner, explains, "cyber rating is an important decision-m…
ARTICLE

NIS 2: how can business leaders gain a clearer understanding?

NIS 2: how can business leaders gain a clearer understanding? 70% of organisations will suffer a digital attack within the next three years[1]. The proliferation of cyberattacks has made IT security a key strategic priority for businesses and public authorities. In this context, …
ARTICLE

What is ransomware and how can you protect yourself against it?

Ransomware is a type of malware that has become increasingly prevalent in the field of cybersecurity. This software encrypts an organization's data and demands a ransom in exchange for the decryption key. The aim is to make them inaccessible, thereby preventing people from worki…
ARTICLE

Security Rating®, a new public policy tool for local authorities

The number of cyber incidents handled by ANSSI fell by 20% in 2022; however, the threat to local authorities remains as strong as ever. Quite the contrary: during the presentation of the latest cyber threat overview, the new director of ANSSI (January 2023), Vincent Strubel, indi…
ARTICLE