Want to know more ?Call our experts !
Experiencing a security issue ?Don't panic, contact us !
Blog articles
Ransomware: the hackers' favorite weapon?
Ransomware is back ! At least that's what McAfee's latest report on ransomware suggests. As a result, ransomware attacks increased by 118% in the...
Cybersecurity emergency for health organizations
Paralyzed hospitals, pacemaker or insulin pump disruption, resale of medical data ... Examples of malicious attacks in the health sector are not...
Cloud and data leaks: how to protect your business?
The cloud is on everyone's lips and already used mainly by companies around the world. The cloud is on the rise. But like any other t...
Cybersecurity challenges for companies
The security market has known in recent years revelations. Although they were widely known by insiders, it confirms that attacks are no longer th...
Securing connected objects (IoT)
The democratization and multiplication of connected objects in homes and businesses are new doors for attackers. These objects are now an integra...
Enterprise vulnerability management: from detection to ...
Step 1: Defining safety rules The Information Systems Security Policy (ISSP) sets out the cybersecurity rules that a company or organisa...
Cyber Threat Intelligence: knowing your opponent better...
For Jacques de La Rivière, CEO of Gatewatcher, Threat Intelligence is a real added value within detection systems. The detection solutions publis...
Kernel Pool Overflow Exploitation in Real World - Windo...
1) Introduction This article will focus on a vulnerability (CVE-2017-6008) we identified in the HitmanPro standalone scan version 3.7.15 ...
Security by Design : the 3 Main Principles
In each product, app, system or connected object, security is a key point. This year’s International Cybersecurity Forum theme is about security and p...
This website uses cookies to ensure you get the best experience on our website. Learn more. Accept cookies