Home
>
Articles
articles

Cyber News

Headlines
Governance

Data governance: 5 tips to optimize your strategy

Regulatory obligations, data-centric organization, storage cost optimization, data monetization... whatever your company's objectives, it all comes down to data. From collection to destruction, companies are responsible for the information and data they hold. That's why it's essential to define an effective data governance strategy.

Read the article
All categories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Tenacy, CESIN 2026 sponsor | Cybersecurity partnership confirmed
News
December 11, 2025
Tenacy will be sponsoring CESIN in 2025, and will continue to do so in 2026!

Tenacy is proud to be an official sponsor of CESIN —a partnership we will continue in 2026, marking our ongoing commitment to the cybersecurity community in France.

Governance
December 8, 2025
Cyber without disruption: the Citalid-Tenacy connector combines risk and compliance

Ah, the eternal dilemma between risk management and compliance... Companies often pit them against each other, and the tools available on the market tend to reflect this dichotomy. However, the two approaches are complementary in the context of your cybersecurity strategy. This is illustrated by the famous ANSSI pyramid: compliance is a necessary foundation for addressing major risks.

Compliance
November 4, 2025
CISO and DPO: what roles do they play in cyber compliance?

Ensuring the security of information systems requires strict compliance with the standards and constraints applicable to each sector of activity and each organization. Chief Information Security Officers (CISOs) and Data Protection Officers (DPOs) each contribute their expertise to serve this common goal.

Top LinkedIn startups in Lyon 2025
Compliance
October 30, 2025
Tenacy voted Top Startup in Lyon by LinkedIn in 2025!

We are proud to announce that Tenacy has been named Top Startup 2025 in Lyon by LinkedIn News, making it one of the five most dynamic startups in the Lyon ecosystem! This prestigious ranking highlights fast-growing local startups that are innovating in their sectors and attracting the best talent.

Compliance
September 30, 2025
How does an ISO 27001 certification audit work?

The initial audit is the first audit in a three-year certification cycle, consisting of the initial audit (year 1) and two surveillance audits (years 2 and 3).

Governance
August 5, 2025
5 reasons to implement a security policy in your company

In order to oversee cybersecurity measures within a company, the management committee must first define its vision. This vision is formalized in a document simply called the information system security policy.

Life as a CISO
July 8, 2025
The first 100 days of the CISO

From assessing the state of IT security to analyzing previous attacks, mapping critical assets, and continuing past actions related to risk analysis, the first 100 days of a CISO's tenure are crucial for the organization.

Reporting
June 23, 2025
SSI Dashboard: 5 KPIs for CISOs & Executive Committees
compliance gap
Compliance
April 13, 2025
How to manage compliance gaps?

In an ever-changing regulatory landscape, companies must comply with a set of standards and regulations related to data protection, IT and employee security, and the functioning of their products. Beyond the penalties for non-compliance —which can be significant—a security breach or unaddressed vulnerability can seriously damage an organization's brand image.

Reporting
April 13, 2025
What tools should you use for your IT security plan?

Your management has just approved your information system security policy (ISSP). What now? It's time to draw up your IT security plan, which should detail the actions to be implemented to ensure the ISSP is applied. Defining objectives, monitoring current and future actions, measuring results... All this requires flawless project management.

Cyber management: risk-based or compliance-based approach?
Compliance
Risks
March 16, 2025
Cyber management: risk-based or compliance-based approach?

"Risk-based approach" and "compliance-based approach": you've probably heard these terms before. These two English terms can be translated into French as "approche par les risques" and "approche par la conformité" – and they are sure to divide the cyber world.

CISO exemption
Compliance
March 3, 2025
How to manage compliance exemptions?

GDPR, LPM, NIS... Companies today are subject to an increasing number of regulatory and compliance frameworks. While these rules are essential to ensuring a high level of security within the organization, they can sometimes hinder the smooth running of operations.