Image Drafting an ISSP: Employees Highlight Management’s Lack of Involvement
Secops
04.17.24 Secops
Drafting an ISSP: Employees Highlight Management’s Lack of Involvement
Read
03
MIN
Image Cloud Sprawl Is Making Businesses Vulnerable to Cyberattacks
Secops
03.11.24 Secops
Cloud Sprawl Is Making Businesses Vulnerable to Cyberattacks
Read
05
MIN
Image How a young hacker was hired (and scammed) by a DGSI (French domestic intelligence) agent
Secops
03.04.24 Secops
How a young hacker was hired (and scammed) by a DGSI (French domestic intelligence) agent
Read
02
MIN
Image Canada: illegal use of data extraction tools by federal ministries
Secops
03.04.24 Secops
Canada: illegal use of data extraction tools by federal ministries
Read
02
MIN
Image AI: how is it impacting the cyber security professions?
Secops
02.08.24 Secops
AI: how is it impacting the cyber security professions?
Read
04
MIN
Image Corporate email: what are tomorrow’s security solutions?
Secops
01.16.24 Secops
Corporate email: what are tomorrow’s security solutions?
Read
04
MIN
Image Ransomware: the professional negotiator’s role
Secops
01.08.24 Secops
Ransomware: the professional negotiator’s role
Read
02
MIN
Image Between threats and legal uncertainty, vulnerability researchers are flying blind
Secops
01.02.24 Secops
Between threats and legal uncertainty, vulnerability researchers are flying blind
Read
05
MIN
Image French government launches health institutions cyber defense plan
Secops
12.26.23 Secops
French government launches health institutions cyber defense plan
Read
01
MIN
Image Best practices in managing IT compliance
Secops
12.13.23 Secops
Best practices in managing IT compliance
Read
04
MIN
Image Cybersecurity compliance: new technologies are on the rise
Secops
12.04.23 Secops
Cybersecurity compliance: new technologies are on the rise
Read
03
MIN
Image United States: Joe Biden signs first executive order on AI
Secops
11.01.23 Secops
United States: Joe Biden signs first executive order on AI
Read
02
MIN
Image Can generative AI help break attack chains?
Secops
10.18.23 Secops
Can generative AI help break attack chains?
Read
05
MIN
Image Thirty-eight TB of internal Microsoft data left unprotected for three years
Secops
09.25.23 Secops
Thirty-eight TB of internal Microsoft data left unprotected for three years
Read
01
MIN
Image Understanding the DORA Directive in five points
Secops
08.21.23 Secops
Understanding the DORA Directive in five points
Read
05
MIN
Image Microsoft singled out in vulnerability patching
Secops
08.14.23 Secops
Microsoft singled out in vulnerability patching
Read
01
MIN
Image Canada: what legal framework is there for SOCMINT?
Secops
08.03.23 Secops
Canada: what legal framework is there for SOCMINT?
Read
05
MIN
Image How NANO Corp is revolutionising network security with end-to-end observability
Secops
06.22.23 Secops
How NANO Corp is revolutionising network security with end-to-end observability
Read
04
MIN
Image [OneTrust] Automated certification as a pillar of trust
Secops
06.19.23 Secops
OneTrust Automated certification as a pillar of trust
Read
04
MIN
Image How to define the scope of a pentest
Secops
06.09.23 Secops
How to define the scope of a pentest
Read
04
MIN
Image What are the legal implications of a ransomware attack?
Secops
06.07.23 Secops
What are the legal implications of a ransomware attack?
Read
06
MIN