Home
>
Articles
articles

Cyber News

Headlines
News

CESIN Barometer 2026: analysis of cyber threats and cybersecurity trends in France

The CESIN 2026 barometer reveals a paradoxical trend in corporate cybersecurity: while the number of significant cyberattacks is decreasing, their consequences are becoming considerably more severe.

This annual study by the Club des Experts de la Sécurité de l'Information et du Numérique (Club of Information and Digital Security Experts) is an essential reference for understanding the evolution of cyber threats in France.

Read the article
All categories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Focus on the TISAX® standard
Glossary
August 30, 2024
TISAX

The TISAX® standard, or Trusted Information Security Assessment Exchange, is not like other information security standards: developed by the European Network Exchange (ENX) association, it is specific to the automotive industry. But what are its requirements? How can it be implemented within an organization? Find all the answers here!

Pentester and CISO: differences and synergies
Risks
July 30, 2024
Testing for better protection: what synergy exists between pentesters and CISOs?

To effectively protect an organization's IT system, you need to know its strengths and weaknesses. This is the role of risk analysis and security audits, the results of which provide valuable information for the CISO.

The Art of Lean Management in Cybersecurity
Governance
July 29, 2024
Lean management applied to cybersecurity

The CISO is often perceived as a technical expert. However, their role also involves a certain amount of management.

In this context, one of the major challenges facing the CISO is that they must improve cybersecurity processes within the company using financial and human resources that are often limited.

This is where lean management comes into play: applying its principles to cybersecurity helps streamline processes and improve teams' operational efficiency. And with good reason: while the concept has its roots in the automotive industry, the principles ofcontinuous improvement and waste reduction also apply to cybersecurity!

What is the concept of Human Firewall?
Risks
July 11, 2024
Human Firewall, or how your employees can protect your business

To cope with the increasing number and sophistication of cyberattacks, companies have been investing in cybersecurity products (firewalls, antivirus software, EDR, etc.) and backup solutions for several years. However, the strategy of relying exclusively on these solutions remains insufficient today.

Military Programming Law (LPM): focus on cybersecurity
Glossary
June 7, 2024
LPM

The Military Programming Law (or LPM) is becoming increasingly well known in the world of cybersecurity —but not only there. This French legislation defines all of the priorities, objectives, and resources allocated to the armed forces for a given period. These objectives certainly concern the security of information systems, but they also relate to equipment, research efforts, and personnel.

However, it is the "cyber" aspect of this law that interests us here. Here is an overview of the requirements of the LPM in terms of IT security —and how to implement them.

Everything you need to know about ISO 27002
Compliance
Glossary
June 7, 2024
ISO 27002: the operational guide to information security measures

While ISO 27001 defines the framework, ISO 27002 is the essential operational guide for implementing your ISMS. But how can you transform this catalog of 93 controls into concrete measures without paralyzing your organization? We have deciphered the keys to its implementation and the advantages of automation to simplify your security management!

What is ISO 27035?
Glossary
June 7, 2024
ISO 27035

ISO 27035 is also known asISO/IEC 27035. Why? Simply because it comes not only from the International Organization for Standardization (ISO), but also from the International Electrotechnical Commission (IEC). An internationally recognized framework for cybersecurity incident management, ISO 27035 is still less well known thanISO 27001 or 27002. And yet, it is crucially important!

All about the ISO 27001 standard
Compliance
Glossary
June 6, 2024
The ISO 27001 certification guide: how to obtain it and successfully manage your compliance?

ISO 27001 is much more than just a line in a sales brochure: it is the international benchmark standard for implementing an ISMS (Information Security Management System). In an increasingly stringent regulatory environment, obtaining ISO 27001 certification has become a major lever for reassuring your partners, securing your critical assets, and meeting the most stringent compliance requirements.

DORA - Definition and analysis
Glossary
Compliance
June 6, 2024
DORA

In France, as elsewhere, the accelerated digitization of financial services has amplified risks in terms of cybersecurity and operational resilience. It is in this context that the European Union introduced the Digital Operational Resilience Act (DORA), a regulatory framework that aims to strengthen the resilience of financial institutions in the face of digital threats. Adopted in November 2022 by the Council of the EU, DORA and its associated directive came into force on January 16, 2023.

Unite teams around cybersecurity
Life as a CISO
April 29, 2024
Uniting teams around cybersecurity: the benefits of collaboration

A company's information system is a constantly evolving environment. Between diverse uses (teleworking, BYOD, OT, etc.) and multiple infrastructures (on-premise, hybrid, full cloud), companies must involve all their employees in order to strengthen their cybersecurity posture.

AI in cybersecurity in 2050
No items found.
April 29, 2024
Prospective: What could the use of artificial intelligence in cybersecurity look like in 2050?

With the emergence of generative artificial intelligence and the dawn of Artificial General Intelligence (AGI), we wanted to imagine scenarios for using AI in cybersecurity solutions by 2050.

This fictional story aims to encourage you to reflect on your use of AI and offer you some food for thought.

SSI Team: Collaboration and Leadership
Life as a CISO
March 14, 2024
SSI Team: Collaboration and Leadership

Historically perceived as a technical expert, the CISO must now evolve into a communicator.

In a constantly changing work environment, the CISO—and more generally the IT security team—is responsible for guiding employees through a vision of what cybersecurity is and should be within the company. While this mechanism is based on sharing best practices and establishing common rules, it must be embodied by strong leadership on the part of the CISO.

But how can you communicate clearly within your organization? How can you share your challenges and priorities with your employees and get them on board? Our expert provides some answers and advice.