Home
>
Articles
articles

Cyber News

Headlines
Glossary

ReCyF 2.5 (Cyber France Reference Framework)

ReCyF is the French cybersecurity framework based on the European NIS 2 Directive. It sets out 20 mandatory security objectives for critical and essential entities and specifies the acceptable means for demonstrating compliance.

Read the article
All categories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
AI in cybersecurity in 2050
No items found.
April 29, 2024
Prospective: What could the use of artificial intelligence in cybersecurity look like in 2050?

With the emergence of generative artificial intelligence and the dawn of Artificial General Intelligence (AGI), we wanted to imagine scenarios for using AI in cybersecurity solutions by 2050.

This fictional story aims to encourage you to reflect on your use of AI and offer you some food for thought.

SSI Team: Collaboration and Leadership
Life as a CISO
March 14, 2024
SSI Team: Collaboration and Leadership

Historically perceived as a technical expert, the CISO must now evolve into a communicator.

In a constantly changing work environment, the CISO—and more generally the IT security team—is responsible for guiding employees through a vision of what cybersecurity is and should be within the company. While this mechanism is based on sharing best practices and establishing common rules, it must be embodied by strong leadership on the part of the CISO.

But how can you communicate clearly within your organization? How can you share your challenges and priorities with your employees and get them on board? Our expert provides some answers and advice.

Automate your compliance with Tenacy
Compliance
March 13, 2024
Why choose a GRC tool to manage and automate your cybersecurity compliance?

As risk and compliance management continues to grow in complexity, many organizations still rely on Excel spreadsheets and manual evidence collection, operating without real-time visibility. However, using a GRC (Governance, Risk & Compliance) tool is becoming essential...

Reporting
March 13, 2024
As a CISO, how should you report to senior management?

New legislative requirements in the area of IT security are now an integral part of corporate governance. As a result, cybersecurity is no longer the sole preserve of the CISO, but is now a topic of interest and concern for executive committees and management teams, who need to have a clear understanding of the issues involved.

The cost(s) of poor cyber management
Life as a CISO
March 13, 2024
What are the costs of poor cyber management?

Faced with increasingly numerous and sophisticated cyber threats, CISOs must add multiple layers of security in order to protect information systems from the risk of compromise.

A proliferation of technological tools that adds operational complexity to the daily challenges of cyber risk management.

Add to this a regulatory framework that is becoming increasingly dense, with ever stricter compliance requirements such as DORA, the Cyber Resilience Act, the GDPR, and soon NIS 2. All of these texts now impose obligations that are no longer limited to the implementation of security measures, but also concern aspects of documentation and traceability.

In this context, managing cybersecurity can be complicated for the CISO, and poor management can result in additional costs for the company. What are these costs? How can they be anticipated and avoided?

Life as a CISO
Compliance
January 8, 2024
Tenacy raises €6 million to accelerate its development in France and Europe

Tenacy, a SaaS platform for cybersecurity and compliance management, announces that it has raised €6 million in funding to accelerate its development in France and conquer the European market, starting with Benelux and Spain.

RSSI who drafts a cybersecurity policy
Compliance
December 20, 2023
How to develop an effective PSSI in 4 steps?

What steps are involved in drafting a PSSI? What elements should it contain? And what pitfalls should be avoided? The answer in four steps...

Comment évaluer et interpréter sa performance en cybersécurité ? - Tenacy<
Reporting
September 26, 2023
How can you assess and interpret your cybersecurity performance?

As a CISO, your priority is to maintain the security of your company's information systems while constantly improving its cybersecurity performance.

But to improve performance, you need to monitor it: that's the purpose of key performance indicators (KPIs). Interpreting this data can be a daily challenge, especially for your senior management. So how can you tell if you have the right level of security, or if you are more vulnerable to attacks than other companies in your sector?

Banking, mutual insurance, insurance: compliance at the heart of the challenges
Compliance
March 14, 2023
Mutual insurance, banking, and insurance: how IT compliance has become a systemic issue

Mutuelle du Mans Assurance (MMA) in July 2020, Mutuelle Nationale des Hôpitaux in February 2021, Axa in May 2021, AssurOne in July 2021, April, Verlingue, Génération and Coverlife in November 2021, Caisse Centrale de Réassurance in July 2022, Emoa Mutuelle du Var in August 2022... The list of cyberattacks against insurers and mutual insurance companies continues to grow.

With the daily management of our personal and medical data, IT security is more than ever a major issue in the functioning of these industries. But what level of IT compliance must these sectors adhere to? And what are the challenges? Our IT compliance expert breaks it down.

NIS 2: what changes for your organization?
Compliance
February 14, 2023
NIS 2: what changes can your organization expect?

The NIS Directive is the first European legislative act dedicated to cybersecurity. Faced with a series of upheavals in the economic and security context of European Union member countries, the current directive is evolving to respond to these new challenges. What does the reform of this new version consist of? How will this directive be transposed into French legislation? Are you affected by the requirements relating to the security of networks and information systems? We have deciphered the changes brought about by NIS 2!

DICP analysis
Risks
December 15, 2022
IT risk assessment: DICP analysis

To address current threats, you need to assess the security of your information system based on the challenges and risks facing your data. You must then define the security level of your IS and assess whether its assets are adequately secured. To help you with this process,the DICP risk analysis takes into account the various security requirements of your system and prioritizes them. You then analyze digital risks according to their availability, integrity, confidentiality, and evidence.

2022 fundraising press release
Compliance
December 8, 2022
Tenacy - formerly AugmentedCISO - raises €2.5 million in initial funding

Tenacy announces €2.5 million in funding to accelerate its growth in the cybersecurity and GRC (governance, risk management, and compliance) markets in France.