
Is artificial intelligence at the service of our cyber-security?
Today, every possible gap in our professions is examined with regard to the real or imagined potential of artificial intelligence....
ReadToday, every possible gap in our professions is examined with regard to the real or imagined potential of artificial intelligence....
ReadIn 2017, the European Commission published a series of initiatives to strengthen the EU’s resilience, deterrence and defense against cyber…
After being approved by the European Parliament on March 12, 2019, the Cybersecurity Act was finally adopted after its publication…
For those who are responsible for the management of a company’s IT infrastructure, it is quite clear that the moat…
You have seen it before, or even already used it to connect to a website, the social login seduces because…
The Single-Sign-On (SSO) allows users to access their applications by logging in only once. They then have access to all…
Based on the standard ISO 27001 and adapted to the requirements of the automotive field, the TISAX (Trusted Information Security…
We don’t know what’s hidden in the obscurity. David Lynch At the end of the 19th century, Auguste Kerckhoffs published…
The administration of the information system (IS) of companies and organizations are based on privileged accounts. Privileged accounts rely on…
A risk manager should always assume that the list of risks considered, however extensive, is incomplete. Douglas W. Hubbard ISO…
Having no problems is the biggest problem of all. Taiichi ÔNO For at least ten years now, I have been…