DATA BREACHES : The five more striking ones Elsa Jonquet Nov 6, 2020 0 Cyber Security Discover the five most important cyberattacks for the last few years and their dramatic consequences
Beware the coronavirus and hackers! Nicolas GUZMAN-SCOLA Mar 18, 2020 0 Cyber Security In these times of coronavirus, hackers use many trick to steal your money.
The 10 most popular cyberattacks used against companies Soukaina OUHAJJI Jan 29, 2020 0 Cyber Security Do you know the most common cyberattacks and do you know how to protect yourself from them?
Third-party cookies banished on Google Chrome Nicolas GUZMAN-SCOLA Jan 21, 2020 0 Cyber Security Google intends to get rid of third-party cookies on its Chrome browser. Is that good news for users? You'll find…
Eight tools to secure your e-shop Soukaina OUHAJJI Oct 28, 2019 0 Cyber Security Eight essential tools to secure an e-shop website.
The effects of a dysfunctional website Elodie DELANNOY Aug 14, 2019 0 Cyber Security Who has never been annoyed by a webpage which takes too long to display, or even a never-ending time to load. You…
How does AI come to the rescue of cybersecurity? Elodie DELANNOY Aug 1, 2019 0 Cyber Security When you know about robots, do you imagine people from the future driving flying cars? Now artificial intelligence…
Pentesting: how does it work? Elodie DELANNOY Jul 10, 2019 0 Cyber Security In the cybersecurity world, we often talk about carrying out audits and regular "penetration tests". If this…
Why should my company carry out security audits on a regular basis? Samy SEGHIER Jun 19, 2019 0 Cyber Security The best way to guarantee a perfect security of your infrastructures is to frequently carry out security audits.…
The NIS Directive : everything explained Nicolas GUZMAN-SCOLA May 17, 2019 0 Legal The NIS directive imposes heavy cybersecurity obligations for some organizations. What are these obligations and…