Jean-François Rousseau, ACCEDIAN: Our NDR Skylight Interceptor solution allows you to cover the blind spots of cyberattacks

Jean Francois Rousseau ACCEDIAN Our NDR Skylight Interceptor solution allows you

Jean-François Rousseau, ACCEDIAN: Our NDR Skylight Interceptor solution allows you to cover the blind spots of cyberattacks On the occasion of the edition of the FIC, ACCEDIAN will announce the launch of its Network Detection Response solution called Skylight Interceptor. This solution provides a comprehensive analysis of network traffic based on our Skylight Analytics platform … Read more

Giuseppe BRIZIO, QUALYS: the approach to cybersecurity must be based on the analysis of risks and impacts in the event of successful cyberattacks

Giuseppe BRIZIO QUALYS the approach to cybersecurity must be based

Giuseppe BRIZIO, QUALYS: the approach to cybersecurity must be based on the analysis of risks and impacts in the event of successful cyberattacks On the occasion of FIC 2022, Qualys will present the evolutions of its platform with, in particular, its Multi-Vector EDR 2.0 offer. This feature is dedicated to quickly assess the surface of … Read more

Cyberattacks targeting the European Union: “It’s essentially espionage”

Cyberattacks targeting the European Union Its essentially espionage

EU agencies and entities are experiencing an increase in cyberattacks. CERT-UE, the Computer Security Incident Response Group, says the primary motivation is cyber espionage. The European Union is a prime target for hackers. Exchanges between diplomats, with member countries, or funding projects interest many hackers, but also foreign governments. The intensity of these operations has … Read more

“24 hours to cyber emergencies”: security experts in action against cyber-attacks

“24 hours to cyber emergencies”: security experts in action against cyber-attacks As cyberattacks multiply, it is interesting to lift the veil on the technical actions that are undertaken by the Consulting Analysts as soon as suspicious movements are made. Detection, response… If the technical dimension is important, human action is at least as important. What … Read more

Companies and cyber-attacks: how to organize? – Widoobiz

A cyber-attack leads to immediate, plural, rapid actions. Mobilized as quickly as possible, the Consulting Analysts and their teams make their first moves with one major objective: to take stock of the ongoing aggression. What kind of attack is it? Who are the attackers? What is their strategy? Above all, how to close as many … Read more

Protecting Against Ransomware: Vectra AI’s Tips for Identifying Cyberattacks Using NDR and Artificial Intelligence

Protecting Against Ransomware Vectra AIs Tips for Identifying Cyberattacks Using

Protecting Against Ransomware: Vectra AI’s Tips for Identifying Cyberattacks Using NDR and Artificial Intelligence Today, many businesses and individuals are infected with ransomware. Here are Vectra AI’s tips to better protect you. The first Trojan horse was sent on a floppy disk to research institutes around the world in 1989. Since then, software extortion attacks … Read more

10,000 startups 2022 prize: Tehtris, the startup that eliminates cyberattacks

10000 startups 2022 prize Tehtris the startup that eliminates cyberattacks

Why did you leave public service security to start a business in 2010? Probably because the caricature of the civil servant lacking initiative has nothing to do with Eléna Poincet. “What excited me was the challenge side, living a new adventure. We only have one life ! », comments Eléna Poincet with enthusiasm. This energetic … Read more

Cyberattacks: “Let’s stop blaming the victims and help startups!” »

Cyberattacks Lets stop blaming the victims and help startups

On the night of February 12 or 13, 2021, the social landlord 1001 Vies Habitat suffered a cyberattack. ” All of our servers have been encrypted and most of our backups destroyed. The company found itself in a black hole, with the impossibility of communicating internally, with our tenants or our suppliers evokes with a … Read more