intelligence artificielle - artificial intelligence

Is artificial intelligence at the service of our cyber-security?

Today, every possible gap in our professions is examined with regard to the real or imagined potential of artificial intelligence....

Read
gestion des accès à privilèges - PAM

What exactly is Privileged Access Management?

If you work in the IT industry, you’ve probably already heard terms like “Privileged Access Management” (PAM) and “Privileged User…

Authentification continue

Continuous Authentication : When Behavioral Analysis Guarantees Your Identity

  Many authentication methods exist nowadays. The most well-known of them is by using the login/password pair. For a better…

ZTNA

ZTNA : A look back to the Zero Trust concept

In its Market Guide for Zero Trust Network Access (ZTNA), Gartner estimates that by 2022, 80% of new business applications…

IT Equipment

How to Reduce the Cost and Environmental Footprint of Your IT Equipment?

For some companies, particularly those from the service sector, the management of IT equipment can represent a significant cost, both…

Cybersecurity: a cost that generates savings

Cybersecurity: a cost that generates savings

For organizations, the deployment of cybersecurity solutions represents a significant and yet essential cost. The challenge is to avoid cyber…

Password vault

Password vault : its potential for cybersecurity

  Are you one of the 83% of Internet users who use the same credentials for several sites? If the…

La pierre de Rosette de la gestion et la gouvernance des identités (IGA)

The Rosetta Stone of Identity Management and Governance

Identity and Governance Administration (IGA) is commonly defined as a centralized orchestration, through the application of security policies, identity management…

Identité et sécurité Security

Identity and security

Security is a global issue.   The security approach has not changed much since Roman times. The idea behind defense-in-depth…

The human face of the workplace

The human face of the workplace

A world without users? “Automation”, “DevOps”, “Robotic Process Automation” (RPA), bots, chatbots and other robots, “artificial intelligence” (AI), … According…

La gestion des identités dans les GHT

Identity management within Hospitals cluster

The GHT (Hospitals cluster in France), created by the Health Act 2016, bring together several hospitals in the same region in…