Image Vulnerability management: act before it is too late (By Sergio Loureiro, SecludIT)
Risks management
01.13.18 Risks management
Vulnerability management: act before it is too late (By Sergio Loureiro, SecludIT)
Read
04
MIN
Image Dark Analtycis (By Cyrille Savelief)
Secops
12.21.17 Secops
Dark Analtycis (By Cyrille Savelief)
Read
11
MIN
Image Incident Response: Preparation is essential - Download the MagIT dedicated E-Guide
Secops
04.13.17 Secops
Incident Response: Preparation is essential – Download the MagIT dedicated E-Guide
Read
01
MIN
Image Prepare for security incidents: Download LeMagIT dedicated E-Guide
Secops
03.13.17 Secops
Prepare for security incidents: Download LeMagIT dedicated E-Guide
Read
01
MIN
Image The Constant Evolution of Security Threats and the Need for a Paradigm Shift (By Ramyan Selvam, Juniper Networks)
Secops
02.14.17 Secops
The Constant Evolution of Security Threats and the Need for a Paradigm Shift (By Ramyan Selvam, Juniper Networks)
Read
03
MIN
Image Cybersecurity: A Field Where an Alliance Makes a Difference (By Eric Monnoyer, INOP's)
Risks management
01.19.17 Risks management
Cybersecurity: A Field Where an Alliance Makes a Difference (By Eric Monnoyer, INOP’s)
Read
03
MIN
Image Evolution of BCP and crisis management to answer cyber threat (By Xavier Fauquet, Formind)
Secops
01.17.17 Secops
Evolution of BCP and crisis management to answer cyber threat (By Xavier Fauquet, Formind)
Read
05
MIN
Image Practice in Cyber Defence: A Key to Success Against Cyberattacks (By Vincent Riou, CEIS)
Secops
01.16.17 Secops
Practice in Cyber Defence: A Key to Success Against Cyberattacks (By Vincent Riou, CEIS)
Read
06
MIN
Image Account hacks: the user or the company – who’s to blame? {By Mike Milner, CTO and Co-founder, IMMUNIO}
Secops
01.09.17 Secops
Account hacks: the user or the company – who’s to blame? {By Mike Milner, CTO and Co-founder, IMMUNIO}
Read
06
MIN
Image Interview: Akamai at the Heart of the Recent DDoS Attacks
Secops
01.07.17 Secops
Interview: Akamai at the Heart of the Recent DDoS Attacks
Read
03
MIN
Image Which indicators and what data are relevant for a SOC ?  (By Julien Steunou, Provadys)
Secops
11.14.16 Secops
Which indicators and what data are relevant for a SOC ? (By Julien Steunou, Provadys)
Read
04
MIN
Image Analysis of HTTPS Traffic: Ending the Gridlock (By Pierre-David Vignolle and Martine Ricouart-Maillet, BRM Avocats)
Secops
11.14.16 Secops
Analysis of HTTPS Traffic: Ending the Gridlock (By Pierre-David Vignolle and Martine Ricouart-Maillet, BRM Avocats)
Read
07
MIN
Image Trends in the technologies of detection and response to cyber attacks - By Helmi RAIS, Senior Manager at Alliacom and Team Manager of AlliaCERT
Secops
10.17.16 Secops
Trends in the technologies of detection and response to cyber attacks – By Helmi RAIS, Senior Manager at Alliacom and Team Manager of AlliaCERT
Read
07
MIN
Image Incident Response: How far can automatisation go ?
Secops
09.19.16 Secops
Incident Response: How far can automatisation go ?
Read
01
MIN
Image CYBER SECURITY: THE NEW BUSINESS PRIORITY FACING EXECUTIVES - By Dr Arthur M. Langer, Columbia University
Secops
09.01.16 Secops
CYBER SECURITY: THE NEW BUSINESS PRIORITY FACING EXECUTIVES – By Dr Arthur M. Langer, Columbia University
Read
14
MIN
Image Cybersecurity video of the month: "would you trust this man?" by Paypal
Secops
07.12.16 Secops
Cybersecurity video of the month: “would you trust this man?” by Paypal
Read
01
MIN
Image Cybersecurity, Cyril Hanouna and the alien effect [by Clément Rossi, CEIS]
Secops
05.02.16 Secops
Cybersecurity, Cyril Hanouna and the alien effect by Clément Rossi, CEIS
Read
08
MIN
Image Dealing with spam: a technical & organizational approach [by Charles Ibrahim]
Secops
01.06.16 Secops
Dealing with spam: a technical & organizational approach by Charles Ibrahim
Read
10
MIN
Image Cyber Attacks : Crisis Recovery and Anticipated Measures [by Daniel Guinier, Expert in cybercrime and financial crimes for the International Criminal Court in The Hague]
Secops
12.31.15 Secops
Cyber Attacks : Crisis Recovery and Anticipated Measures by Daniel Guinier, Expert in cybercrime and financial crimes for the International Criminal Court in The Hague
Read
13
MIN
Image An Ecosystem for Private Customer Data Management [by Harald Gjermundrød, Département of Computer Science, University of Nicosia, Cyprus]
Secops
12.31.15 Secops
An Ecosystem for Private Customer Data Management by Harald Gjermundrød, Département of Computer Science, University of Nicosia, Cyprus
Read
13
MIN
Image Dematerialisation represents an important step towards greater trust, greater fluidity, greater accessibility and greater security in digital affairs in Europe. [by Jean-Marc Rietsch, international dematerialisation expert]
Secops
10.15.15 Secops
Dematerialisation represents an important step towards greater trust, greater fluidity, greater accessibility and greater security in digital affairs in Europe. by Jean-Marc Rietsch, international dematerialisation expert
Read
03
MIN