The digitization of corporate working practices has accelerated since the Covid-19 crisis, amplifying a worrying shortage of cybersecurity professionals. While many organizations are investing in increasingly complex IT infrastructures, professionals capable of understanding the …
ARTICLE
In the cybersecurity environment, understanding and managing vulnerabilities are essential for protecting systems, applications, and data. Among the fundamental tools in this fight against cyber threats, the Common Vulnerabilities and Exposures (CVE) system plays a key role.
CVEs…
ARTICLE
A data leak refers to the unauthorized disclosure of personal or sensitive information belonging to an organization or its users. These disclosures can involve millions of records, including personal data such as social security numbers, contact details, or other confidential inf…
ARTICLE
In a world where cyber threats are increasingly frequent and sophisticated, the role of the Chief Information Security Officer (CISO) has become essential to protect organizations. Working closely with the Chief Information Officer (CIO), they ensure that security requirements ar…
ARTICLE
Incidents involving infostealers remain underestimated. This malware directly targets password vaults built into browsers. It operates within the user session and frequently bypasses EDR detection. The issue is simple: in the event of a leak, you must report the incident to ANSSI…
ARTICLE
1 Ubiquitous risk, essential protection
In 2016, if you asked a CISO what his day was made of, he would answer "Cloud", "Antivirus", "General Data Protection Regulation" or "connected objects". He would tell you about his fears of cyber-attacks and his company's lack of maturity,…
ARTICLE
2 Distrustful companies, uneven solutions
While a growing number of companies of all sizes have understood the importance of a controlled cyber rating, some still perceive it as an intrusion.... Julien Steunou, Associate Director - SOC CERT CWATCH at Almond, a Board Of Cyber part…
ARTICLE
3 Security Rating®, the answer from Board of Cyber
For a company, the added value of a reliable, controlled cyber rating is significant. As Julien Steunou, Associate Director - SOC CERT CWATCH at Almond, a Board Of Cyber partner, explains, "cyber rating is an important decision-m…
ARTICLE
NIS 2: how can business leaders gain a clearer understanding?
70% of organisations will suffer a digital attack within the next three years[1]. The proliferation of cyberattacks has made IT security a key strategic priority for businesses and public authorities.
In this context, …
ARTICLE
Pentest vs EASM: how effective are they at detecting cyber vulnerabilities?
Faced with growing cyber risks, CISOs are looking to improve the detection of threats to their information systems. Analysis of the [external attack surface (EASM)](https://www.boardofcyber.io/ressources/…
ARTICLE
Ransomware is a type of malware that has become increasingly prevalent in the field of cybersecurity. This software encrypts an organization's data and demands a ransom in exchange for the decryption key.
The aim is to make them inaccessible, thereby preventing people from worki…
ARTICLE
The number of cyber incidents handled by ANSSI fell by 20% in 2022; however, the threat to local authorities remains as strong as ever. Quite the contrary: during the presentation of the latest cyber threat overview, the new director of ANSSI (January 2023), Vincent Strubel, indi…
ARTICLE
In a context where digital exchanges are at the core of business processes, securing application traffic and APIs is no longer optional but an operational requirement.
This article explains to CISOs, CIOs, and security leaders why the TLS protocol and strict management of X.509 c…
ARTICLE