Cyber News
ReCyF 2.5 (Cyber France Reference Framework)
ReCyF is the French cybersecurity framework based on the European NIS 2 Directive. It sets out 20 mandatory security objectives for critical and essential entities and specifies the acceptable means for demonstrating compliance.


In the cyber world, everyone (or almost everyone) has heard of the HDS standard, or Health Data Hosting. And with good reason: this French standard (and its corresponding certification) is a must for companies that process and host health data. Here's an overview.

The General Security Reference Framework (RGS) is a set of rules, standards, and best practices developed by the French government in February 2010. Its goal? To guarantee the security of information systems used by public administrations, as well as by digital service providers working with them. The aim is to ensure data protection, confidentiality, integrity, availability, and authenticity—the ultimate goal being to strengthen user confidence in electronic exchanges with public services. Let's take a closer look.

The TISAX® standard, or Trusted Information Security Assessment Exchange, is not like other information security standards: developed by the European Network Exchange (ENX) association, it is specific to the automotive industry. But what are its requirements? How can it be implemented within an organization? Find all the answers here!

To effectively protect an organization's IT system, you need to know its strengths and weaknesses. This is the role of risk analysis and security audits, the results of which provide valuable information for the CISO.

The CISO is often perceived as a technical expert. However, their role also involves a certain amount of management.
In this context, one of the major challenges facing the CISO is that they must improve cybersecurity processes within the company using financial and human resources that are often limited.
This is where lean management comes into play: applying its principles to cybersecurity helps streamline processes and improve teams' operational efficiency. And with good reason: while the concept has its roots in the automotive industry, the principles ofcontinuous improvement and waste reduction also apply to cybersecurity!

To cope with the increasing number and sophistication of cyberattacks, companies have been investing in cybersecurity products (firewalls, antivirus software, EDR, etc.) and backup solutions for several years. However, the strategy of relying exclusively on these solutions remains insufficient today.

The Military Programming Law (or LPM) is becoming increasingly well known in the world of cybersecurity —but not only there. This French legislation defines all of the priorities, objectives, and resources allocated to the armed forces for a given period. These objectives certainly concern the security of information systems, but they also relate to equipment, research efforts, and personnel.
However, it is the "cyber" aspect of this law that interests us here. Here is an overview of the requirements of the LPM in terms of IT security —and how to implement them.

While ISO 27001 defines the framework, ISO 27002 is the essential operational guide for implementing your ISMS. But how can you transform this catalog of 93 controls into concrete measures without paralyzing your organization? We have deciphered the keys to its implementation and the advantages of automation to simplify your security management!

ISO 27035 is also known asISO/IEC 27035. Why? Simply because it comes not only from the International Organization for Standardization (ISO), but also from the International Electrotechnical Commission (IEC). An internationally recognized framework for cybersecurity incident management, ISO 27035 is still less well known thanISO 27001 or 27002. And yet, it is crucially important!

ISO 27001 is much more than just a line in a sales brochure: it is the international benchmark standard for implementing an ISMS (Information Security Management System). In an increasingly stringent regulatory environment, obtaining ISO 27001 certification has become a major lever for reassuring your partners, securing your critical assets, and meeting the most stringent compliance requirements.

The accelerated digitization of financial services has transformed the risk landscape. Faced with increasingly sophisticated cyber threats, the European Union has responded with the Digital Operational Resilience Act (DORA).

A company's information system is a constantly evolving environment. Between diverse uses (teleworking, BYOD, OT, etc.) and multiple infrastructures (on-premise, hybrid, full cloud), companies must involve all their employees in order to strengthen their cybersecurity posture.