Home
>
Articles
articles

Cyber News

Headlines
Glossary

ReCyF 2.5 (Cyber France Reference Framework)

ReCyF is the French cybersecurity framework based on the European NIS 2 Directive. It sets out 20 mandatory security objectives for critical and essential entities and specifies the acceptable means for demonstrating compliance.

Read the article
All categories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Everything you need to know about the HDS standard
Glossary
August 30, 2024
HDS

In the cyber world, everyone (or almost everyone) has heard of the HDS standard, or Health Data Hosting. And with good reason: this French standard (and its corresponding certification) is a must for companies that process and host health data. Here's an overview.

RGS (General Security Reference System) - Definition
Glossary
August 30, 2024
RGS

The General Security Reference Framework (RGS) is a set of rules, standards, and best practices developed by the French government in February 2010. Its goal? To guarantee the security of information systems used by public administrations, as well as by digital service providers working with them. The aim is to ensure data protection, confidentiality, integrity, availability, and authenticity—the ultimate goal being to strengthen user confidence in electronic exchanges with public services. Let's take a closer look.

Focus on the TISAX® standard
Glossary
August 30, 2024
TISAX

The TISAX® standard, or Trusted Information Security Assessment Exchange, is not like other information security standards: developed by the European Network Exchange (ENX) association, it is specific to the automotive industry. But what are its requirements? How can it be implemented within an organization? Find all the answers here!

Pentester and CISO: differences and synergies
Risks
July 30, 2024
Testing for better protection: what synergy exists between pentesters and CISOs?

To effectively protect an organization's IT system, you need to know its strengths and weaknesses. This is the role of risk analysis and security audits, the results of which provide valuable information for the CISO.

The Art of Lean Management in Cybersecurity
Governance
July 29, 2024
Lean management applied to cybersecurity

The CISO is often perceived as a technical expert. However, their role also involves a certain amount of management.

In this context, one of the major challenges facing the CISO is that they must improve cybersecurity processes within the company using financial and human resources that are often limited.

This is where lean management comes into play: applying its principles to cybersecurity helps streamline processes and improve teams' operational efficiency. And with good reason: while the concept has its roots in the automotive industry, the principles ofcontinuous improvement and waste reduction also apply to cybersecurity!

What is the concept of Human Firewall?
Risks
July 11, 2024
Human Firewall, or how your employees can protect your business

To cope with the increasing number and sophistication of cyberattacks, companies have been investing in cybersecurity products (firewalls, antivirus software, EDR, etc.) and backup solutions for several years. However, the strategy of relying exclusively on these solutions remains insufficient today.

Military Programming Law (LPM): focus on cybersecurity
Glossary
June 7, 2024
LPM

The Military Programming Law (or LPM) is becoming increasingly well known in the world of cybersecurity —but not only there. This French legislation defines all of the priorities, objectives, and resources allocated to the armed forces for a given period. These objectives certainly concern the security of information systems, but they also relate to equipment, research efforts, and personnel.

However, it is the "cyber" aspect of this law that interests us here. Here is an overview of the requirements of the LPM in terms of IT security —and how to implement them.

Everything you need to know about ISO 27002
Compliance
Glossary
June 7, 2024
ISO 27002: the operational guide to information security measures

While ISO 27001 defines the framework, ISO 27002 is the essential operational guide for implementing your ISMS. But how can you transform this catalog of 93 controls into concrete measures without paralyzing your organization? We have deciphered the keys to its implementation and the advantages of automation to simplify your security management!

What is ISO 27035?
Glossary
June 7, 2024
ISO 27035

ISO 27035 is also known asISO/IEC 27035. Why? Simply because it comes not only from the International Organization for Standardization (ISO), but also from the International Electrotechnical Commission (IEC). An internationally recognized framework for cybersecurity incident management, ISO 27035 is still less well known thanISO 27001 or 27002. And yet, it is crucially important!

All about the ISO 27001 standard
Compliance
Glossary
June 6, 2024
The ISO 27001 certification guide: how to obtain it and successfully manage your compliance?

ISO 27001 is much more than just a line in a sales brochure: it is the international benchmark standard for implementing an ISMS (Information Security Management System). In an increasingly stringent regulatory environment, obtaining ISO 27001 certification has become a major lever for reassuring your partners, securing your critical assets, and meeting the most stringent compliance requirements.

DORA - Definition and analysis
Glossary
Compliance
June 6, 2024
DORA Regulation: The Complete Guide to Digital Operational Resilience

The accelerated digitization of financial services has transformed the risk landscape. Faced with increasingly sophisticated cyber threats, the European Union has responded with the Digital Operational Resilience Act (DORA).

Unite teams around cybersecurity
Life as a CISO
April 29, 2024
Uniting teams around cybersecurity: the benefits of collaboration

A company's information system is a constantly evolving environment. Between diverse uses (teleworking, BYOD, OT, etc.) and multiple infrastructures (on-premise, hybrid, full cloud), companies must involve all their employees in order to strengthen their cybersecurity posture.