Author Avatar
28/06/2018

Backup, your last line of defense!

Everybody knows that backups are important. This article will tell you more about how secure you need to store and handle your backups.

Read More...
Author Avatar
20/06/2018

We all have vulnerabilities! But how to address them?

What is my most valuable data? Is it backed up? Is it protected? These are some questions you may have already asked yourself. But what about systems that process or store this data? Are they...

Read More...
Author Avatar
15/06/2018

Beware of the ROBOT

ROBOT, the Return Of Bleichenbacher's Oracle Threat, is a vulnerability that affects TLS cipher modes that use RSA encryption. It allows performing unauthorized operations with the private key of...

Read More...
Author Avatar
13/06/2018

Step 4: Start the journey to Micro-Segmentation

Micro-Segmentation you said? What is that?

Read More...
Author Avatar
28/05/2018

Step 3: The Journey to a Secure Environment

Step 3: Protect your Virtual Machines from the Hyper-Visor. In legacy server environments, we install anti-virus agents on the servers. These anti-virus agents need to be upgraded on a regular...

Read More...
Author Avatar
14/05/2018

GlobalSign disables support for TLS 1.0 and 1.1

The protocol support for TLS 1.0 and 1.1 will be disabled on 21st of June 2018.

Read More...
Author Avatar
08/05/2018

The Journey to a Secure Environment: Step 2

Every week, new security vulnerabilities get discovered. Scanning the perimeter will give you a report of your environment against these vulnerabilities.

Read More...
Author Avatar
29/03/2018

Why patching Windows is that important. How to improve it with quick wins?

90% of workstations are running Windows. Malware, Ransomware, Trojan... All these security threats use Windows to make damages. Let see how you can protect yourself against them...

Read More...
Author Avatar
22/03/2018

The Journey to a Secure Environment: Step 1

How to start the journey to a secure environment for non-IT organisations? It only takes a few steps.

Read More...
Author Avatar
15/03/2018

Meet the data security obligations required by GDPR by easily enforcing encryption policies

GDPR has the potential to introduce positive changes for many businesses. It is designed to increase the harmonization of national data protection laws across the EU while, at the same time,...

Read More...

Current job openings

Sign up to our newsletter

Follow us

  

Share this article