Shadow IT

Shadow IT refers to all IT systems, software solutions, applications and processes used within an organisation without the approval, control or authorisation of the...

SOC 🟩 Structure

A SOC (Security Operations Centre) is a structure, often physical but also virtual, whose mission is to monitor, analyse and protect an organisation against cyber threats on a continuous basis, 24/7.

Spyware 🔴 Attack

Spyware is a type of malicious software that installs itself on a device without the user's knowledge to collect personal information and pass it on to a third party.

Spyware can steal sensitive data such as passwords, banking information and private conversations. Spyware is one of the most widespread threats on the Internet, affecting both computers and mobile devices. Spyware is designed to operate discreetly in the background, making it difficult to detect and remove without specialised tools.

TLS (Transport Layer Security) 🟢 Protection

TLS (Transport Layer Security) is a cryptographic protocol designed to secure communications on the Internet.

It establishes a secure channel between a web server and a client (a browser, for example), guaranteeing the confidentiality and integrity of the data exchanged. TLS is the successor to the SSL (Secure Sockets Layer) protocol.

Virus 🔴 Attack

A virus is a type of malicious software (malware) that, once executed, reproduces itself by inserting copies of itself into other programs or files on a computer. It can also modify or destroy data.