Home
>
Articles
articles

Cyber News

Headlines
Governance

Data governance: 5 tips to optimize your strategy

Regulatory obligations, data-centric organization, storage cost optimization, data monetization... whatever your company's objectives, it all comes down to data. From collection to destruction, companies are responsible for the information and data they hold. That's why it's essential to define an effective data governance strategy.

Read the article
All categories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
The Art of Lean Management in Cybersecurity
Governance
July 29, 2024
Lean management applied to cybersecurity

The CISO is often perceived as a technical expert. However, their role also involves a certain amount of management.

In this context, one of the major challenges facing the CISO is that they must improve cybersecurity processes within the company using financial and human resources that are often limited.

This is where lean management comes into play: applying its principles to cybersecurity helps streamline processes and improve teams' operational efficiency. And with good reason: while the concept has its roots in the automotive industry, the principles ofcontinuous improvement and waste reduction also apply to cybersecurity!

Qu’est-ce que le concept de Human Firewall ?
Risks
11 July 2024
Human Firewall, ou comment vos employés peuvent protéger votre entreprise

Pour faire face à la multiplication et à la sophistication croissante des cyberattaques, les entreprises investissent depuis plusieurs années dans des produits de cybersécurité (pare-feux, antivirus, EDR…) et de sauvegarde. Pourtant, la stratégie visant à se reposer exclusivement sur ces solutions reste aujourd’hui insuffisante.

Military Programming Law (LPM): focus on cybersecurity
Glossary
June 7, 2024
LPM

The Military Programming Law (or LPM) is becoming increasingly well known in the world of cybersecurity —but not only there. This French legislation defines all of the priorities, objectives, and resources allocated to the armed forces for a given period. These objectives certainly concern the security of information systems, but they also relate to equipment, research efforts, and personnel.

However, it is the "cyber" aspect of this law that interests us here. Here is an overview of the requirements of the LPM in terms of IT security —and how to implement them.

Tout savoir sur la norme ISO 27002
Compliance
Glossary
June 7, 2024
ISO 27002

Les experts de la cybersécurité connaissent la norme ISO 27002. Certains s’en inspirent pour garantir la bonne santé du système d’information de leur entreprise ou maintenir la certification ISO 27001 de leur SMSI, quand d’autres la considèrent de loin, n’y voyant pas d’intérêt pour leur organisation.

Et, pourtant, cette norme est loin de n’être réservée qu’à une certaine catégorie d’entreprises, soumises à des réglementations spécifiques – surtout depuis sa mise à jour en 2022. Elle peut, en effet, participer à l’amélioration de la posture de cybersécurité de toute organisation… à condition de savoir comment l’utiliser et avec quel outil.

What is ISO 27035?
Glossary
June 7, 2024
ISO 27035

ISO 27035 is also known asISO/IEC 27035. Why? Simply because it comes not only from the International Organization for Standardization (ISO), but also from the International Electrotechnical Commission (IEC). An internationally recognized framework for cybersecurity incident management, ISO 27035 is still less well known thanISO 27001 or 27002. And yet, it is crucially important!

All about the ISO 27001 standard
Compliance
Glossary
June 6, 2024
The ISO 27001 Certification Guide

Published in 2005, the international standard ISO 27001 sets out the reference framework for establishing an information security management system (ISMS). This standard approaches security from the perspective of managing the risks to your data, based on a simple concept that can be summed up in one sentence: "prevention is better than cure." Let's take a closer look.

DORA - Definition and analysis
Glossary
June 6, 2024
DORA

In France, as elsewhere, the accelerated digitization of financial services has amplified risks in terms of cybersecurity and operational resilience. It is in this context that the European Union introduced the Digital Operational Resilience Act (DORA), a regulatory framework that aims to strengthen the resilience of financial institutions in the face of digital threats. Adopted in November 2022 by the Council of the EU, DORA and its associated directive came into force on January 16, 2023.

Fédérer les équipes autour de la cybersécurité
Life as a CISO
29 April 2024
Fédérer les équipes autour de la cybersécurité : les avantages de la collaboration

Le système d’information d’une entreprise est un environnement en constante évolution. Entre diversité des usages (télétravail, BYOD, OT…) et pluralité des infrastructures (on-premise, hybride, full cloud), l’entreprise se doit d’impliquer l’ensemble de ses collaborateurs dans le but de renforcer sa posture de cybersécurité.

L’IA dans la cybersécurité en 2050
No items found.
29 April 2024
Prospective : À quoi pourrait ressembler l’utilisation de l’intelligence artificielle dans la cybersécurité dès 2050 ?

À l’heure de l’émergence de l’intelligence artificielle générative, et à l’aube de l’émergence de l’Intelligence Artificielle Générale (AGI), nous avons voulu imaginer des scénarios d’utilisation de l’IA dans les solutions de cybersécurité à l’horizon 2050.

Ce récit fantasmé a pour objectif de vous inciter à réfléchir sur votre utilisation de l’IA et de vous offrir des perspectives de réflexion.

[White paper] 5 keys to managing your cybersecurity
Compliance
April 16, 2024
Developing a PSI in four steps

The information system security policy (ISSP) is more than just a reference document: it represents the foundation of the strategic vision for the company's IS security. Nothing less.

Equipe SSI : Collaboration et Leadership
Life as a CISO
14 March 2024
Équipe SSI : collaboration et leadership

Historiquement perçu comme un expert technique, le RSSI se doit désormais d’évoluer vers un rôle de communiquant.

Dans un environnement de travail en constante évolution, le RSSI – et plus généralement l’équipe SSI – sont chargés de guider collaborateurs au travers d’une vision de ce qu’est et ce que doit être la cybersécurité au sein de l’entreprise. Si cette mécanique se base sur le partage de bonnes pratiques et l’établissement de règles communes, elle se doit d’être incarnée par un leadership affirmé de la part du RSSI.

Mais alors comment communiquer de manière intelligible auprès de votre organisation ? Comment partager et faire adhérer vos collaborateurs à vos enjeux et prérogatives ? Éléments de réponse et conseils de notre expert.

Automate your compliance with Tenacy
Compliance
March 13, 2024
How to automate compliance with Tenacy?

Monitoring compliance, raising awareness of cyber risks, risk analysis, and day-to-day management... Year after year, CISOs are being given more and more responsibilities—a trend that is unfortunately likely to continue with the upcoming introduction of new regulations.

To the question: how can you manage your work time effectively? The answer may lie in automating certain tasks, particularly those related to compliance.

This raises several questions: Is it possibleto automate certification management? To what extent? How can the Tenacy platform simplify the implementation, maintenance, and assessment of compliance? Let's start at the beginning.