The growing digital divide between urban and rural areas is one of the major challenges faced by citizens and businesses in Europe. EU, national, regional and local governments must therefore intensify cooperation to ensure a decent access to internet and digital services in key areas such as healthcare, education, public services, social inclusion. This was one of the main messages that emerged from the meeting of the Commission for Economic Policy (ECON) of the European Committee of the (...)
Accueil > Mots-clés > afficher un article sur la home > cybersecurite_home_droite
cybersecurite_home_droite
Articles
-
Access to internet and digital services is vital to achieve cohesion between EU territories
8 July 2022, by European Committee of Regions -
Jelle Wieringa : "We don’t want to force anyone to do cybersecurity training, we want to enable them and motivate them to do it themselves!"
29 November 2022, by Yelena Jangwa-Nedelec, Global Security MagWhat we do at KnowBe4 is very simple. We focus on the human aspect in cybersecurity and we’ve been doing it for 12 years. We help users make smarter security decisions, that’s the marketing gap. Our perspective is that, you can buy technology, you can get processes in place but everybody forgets about the human there. Everybody forgets that it’s not the technology that makes the mistake of taking on the email, but it’s the user. And the reason the user does this is because he doesn’t know better, he doesn’t recognize the risk, he’s too busy, he can’t control his own emotions.
-
ENISA publishes a joint framework to supervise the security of services and personal data processing by telecom providers in the EU
9 April 2015, by ENISAENISA provides a single framework addressing the security measures covering technical and organizational measures applicable by the EU regulation on electronic communications, namely Article 13a of the Telecom Framework Directive and Article 4 of the ePrivacy Directive. The legislation requires Member States to ensure that telecom providers protect the security of their networks and services (Article 13a and Article 4), and the security of personal data processing (Article 4).
The joint (...) -
NEW FILE Cyber Security
6 January 2015In this new section you will find offers for CYBER SECURITY our partners.
For information to book your space please contact us:
Marc BRAMI
Tel + 33 1 40 92 05 55
ipsimp@free.fr -
SailPoint : "You can only make smart decisions about things you can see."
29 November 2022, by Yelena Jangwa-Nedelec, Global Security MagSailPoint: We care about identity security. It is mainly managing all the access a user has. So it basically answers 3 questions: Who has access to what and why? It’s that easy. But putting it into practice is harder to do. We help our customers with our technology to answer those questions. The idea is to get a single source to find all the information needed about the access of a user. The customer has to use a lot of different applications. Nowadays, in a midsized company, you have around 5000 to 10000 users, that means hundred thousands of entitlements you have to care about, coming from all the different applications you have to connect to a system.This is way above what human beings could do on a keyboard. This is one of the reason why we introduced AI (artificial intelligence) to that game a year ago.
If we take the example of a jumbo jet, 90% of the flight is more or less automated and the pilots, as experts, are trained for the really critical situations.
-
Visit of EC VP Ansip at the EU cybersecurity Agency in Greece
11 May 2017, by ENISAEuropean Commission Vice-President Ansip visited the EU Agency for cybersecurity at its premises in Athens today 11th May 2017, for a discussion on its activities and future role in the EU cyber security landscape.
The programme during VP Andrus Ansip’s visit included:
Meeting with ENISA’s Executive Director Udo Helmbrecht and staff, for an exchange of views on the evolving cybersecurity landscape within the European and international context
An exchange of views of the upcoming review (...) -
Yuval Baron, CEO of AlgoSec talks company culture and the acquisition of agentless CSPM Prevasio
6 December 2022, by Yelena Jangwa-Nedelec, Global Security MagOur acquisition of Prevasio is official as of today. Prevasio is a Cloud security company that we acquired to help us have a comprehensive cloud solution for organizations. Those organizations have lots of assets in the cloud, they have data centers in their local network and with this acquisition, we can enable the holistic security approach they need to have.
Global Security Mag: Can you first tell us a bit about AlgoSec?
Yuval Baron: Our vision is to secure application connectivity (...) -
Cynet Free IR Tool Offering Empowers Responders to Know and Act Against Active Attacks
8 May 2019, by CYNETThe saying that there are two types of organizations, those that have gotten breached and those who have but just don’t know it yet, has never been more relevant, making sound incident response a required capability in any organization’s security stack.
To assist in this critical mission, Cynet is launching a free IR tool offering, applicable to both IR service providers in need of a powerful, free incident response platform, and to organizations that either suspect security incidents and (...) -
NOUVELLE RUBRIQUE CYBER SECURITE
6 janvier 2015Dans cette nouvelle rubrique vous retrouverez les offres en matière de CYBER SECURITE de nos partenaires.
Pour toute information pour réservez vos espaces contactez-nous :
Marc BRAMI Tél + 33 1 40 92 05 55 ipsimp@free.fr -
Combating Ransomware: Don’t Let Your data be held hostage
30 May 2023, by Srinivasan CR, Executive Vice President - Cloud and Cybersecurity Services & Chief Digital OfficerEnterprises today operate in a digitally connected world, where technology and connectivity are core of their digital transformation strategies and operations. However, with hyperconnectivity, organisations must also contend with hyper-exposure to cyber risk.
As a leading provider of cyber threat intelligence and cybersecurity solutions, Tata Communications network analytics and insights platform analyses 25 million traffic flow records per minute from across the globe. This information allows Tata Communications to proactively detect and prevent approximately 2.6 million threats every day globally. In addition, our global security operations centre (SOC) constantly monitors, manages and protects nearly 24,000 business-critical applications/assets and thousands of end users.