As internet traffic continues to surge, Adam Davenport, director of interconnection strategy at GTT, explores the steps that must be taken to better protect consumers and businesses against route leaks and hijacks.
Throughout the COVID-19 pandemic, more and more people have relied on the internet to stay connected while keeping their distance. As a result, internet traffic has surged by around 30% since March. Putting that into context, it’s a volume of growth we’d typically expect for an (...)
Accueil > Mots-clés > afficher un article sur la home > affiche
affiche
Articles
-
Adding a New Layer of Security to the Global Internet
25 June 2020, by Adam Davenport, director of interconnection strategy at GTT -
ISACA EuroCACS speaker says increased use of personal e-mail for business poses new risks
22 March 2011, by Marc JacobPeter Wood, a speaker at the upcoming ISACA European Computer Audit, Control and Security Conference (EuroCACS) event in Manchester, said that personal e-mail services, are being increasingly used for business purposes¾a situation that places company data at great risk.
According to Wood, CEO of penetration testing specialists at First Base Technologies, the use of personal e-mail for business is expanding, creating security issues such as a lack of data leak prevention (DLP) controls and (...) -
Justin Pirie, Mimecast: Cloud Computing Standards, The Great Debate
6 April 2011, by Justin Pirie, Director of Communities and Content for MimecastRecent research conducted by Mimecast has found that a large proportion of businesses are now using some form of cloud service, with a further 30 percent planning on adopting more cloud services in the future. Fashionable new architectures within the technology industry are not unusual. However, even allowing for a certain amount of bandwagon jumping, this rate of cloud adoption has been considerable.
The ‘cloud’ itself is a competent and established business tool that solves a range of (...) -
Protecting Data from Ransomware and other Attacks
31 August 2021, by Ulf T. MattssonAttackers may already be in your environment and constantly find new ways to avoid detection. Make sure that your data is private and protected in transit, in use, in memory, and at rest. Sensitive data can be secured and protected by a robust data backup plan so systems can quickly be restored. A multi-layered defense can help to create a good security posture and how to discover unusual activity on your sensitive data.
The Threat Landscape
Attacks involving Phishing, Ransomware, (...) -
RGPD : LA 1ÈRE QUESTION À SE POSER DOIT ÊTRE « MON DPO EST-IL PRÊT POUR LE 25 MAI ? »
17 mai 2018, par Gilles GARNIER, Directeur de la Practice Protection des Données, Harmonie TechnologieLa mise en application du Règlement Général sur la Protection des Données (RGPD) sera effective le 25 mai 2018. Bien que la CNIL puisse entendre qu’à cette date tous les chantiers de mise en conformité ne seront pas terminés, elle pourra difficilement comprendre l’absence de désignation d’un DPO (d’ores et déjà réalisable en ligne sur son site) qui marque la première étape. C’est un manquement pour lequel la CNIL pourrait sanctionner jusqu’à 20 millions d’euros ou 4% du chiffre d’affaires groupe annuel. Qui (...)
-
CLUSIF : Indicateurs stratégiques de Sécurité une aide indispensable pour les RSSI
19 octobre 2017, par Marc JacobPour ce nouveau débat du CLUSIF, les indicateurs stratégiques de sécurité ont été mis à l’honneur avec leur corolaire les tableaux de bord. Pour nos experts ces indicateurs et tableaux de bord sont des aides indispensables pour les RSSI pour piloter les risques mais aussi obtenir des budgets.
Thierry Chiofalo explique en introduction que pour piloter une activité on a toujours besoin de tableau de bord qui est une sorte de GPS, mais aussi un jauge à essence... grâce à ces derniers, on réduit les (...) -
RGPD et Collectivités : tout reste à faire !
22 juin 2018, par Thomas VEILL’agor@ du FIC a organisé un cycle de débats ayant pour titre « les collectivités locales faces aux défis du RGPD » au cours duquel des présidents d’associations, des élus locaux ou encore des membres du Sénat ou de l’Assemblée Nationale étaient présents. Les débats ont montré que les collectivités dans leur majorité sont très loin d’atteindre la conformité au RGPD.
Général Marc Watin-Augouard
L’ouverture de cette matinée de débats est laissée au Général Marc Watin-Augouard, fondateur et codirecteur du FIC (...) -
Estelle Joly-Foillard, CyberVadis: By using the CyberVadis solution, our customers can assess and monitor their cybersecurity risk on their whole supply chain
16 May 2019, by Marc JacobCyberVadis was developed by EcoVadis, the global leader in CSR ratings. The company has developed a solution to evaluate the maturity of suppliers in terms of cybersecurity management on an unlimited scale. Estelle Joly-Foillard, CyberVadis’ VP Strategy & Operations, believes that by using the company’s end-to-end solution, its customers have clear and well-defined visibility of cybersecurity risk across their entire supply chain.
GSM: Can you introduce your company? (creation, group, (...) -
Marc Hocking, Becrypt : Meeting the Government’s Austerity measures with Secure Remote Working
6 April 2011, by Marc Hocking, Chief Technology Officer, BecryptOn the 11 October 2010 the Daily Telegraph printed an article entitled ‘David Cameron’s secret plan to cut UK’s £149bn debt by selling off property. (http://www.telegraph.co.uk/finance/newsbysector/constructionandproperty/8054350/David-Camerons-secret-plan-to-cut-UKs-149bn-debt-by-selling-off-property.html). This is a prime example of Government departments, local authorities and the wider public sector facing rationalisation of a magnitude never before seen. To meet the government’s (...)
-
Prescott B. Winter, ArcSight: Chink in the Cyber Armour?
6 April 2011, by Prescott B. Winter, Chief Technology Officer for the Public Sector, ArcSightWhen evaluating our effectiveness in dealing with cyber defence, we have two layers of uncertainty and risk: how effectively are we protecting critical information, and what are the adversaries actually getting and how might they use it against us?
In today’s interconnected world, we regularly deal with systems of overwhelming complexity and largely unmeasured risk, and that is before they become potential targets of explicit attack. Multiple risks, including software errors and network (...)