ORSYS le mag 2025 logo

The training and skills medium

logo
  • Digital technologies
    • Business intelligence
    • Certifications
    • Cybersecurity
    • Development
    • Project management
    • AI and big data
    • DTP, CAD, video and graphics
    • Robotics, embedded systems
    • Information system
    • Virtualisation, cloud, DevOps
  • Management
    • Project management
    • Lean management
    • Management and leadership
    • Remote work
  • Personal development
    • Interpersonal communication
    • Personal effectiveness
  • Business
    • Purchasing and logistics
    • Sales - Customer relations
    • Business management
    • Training
    • Marketing - Communication
    • DTP, CAD, video and graphics
    • Human resources
    • CSR
    • Assistantship – Secretariat
  • Sectors
    • Industry
    • SMEs
    • Health
    • Public sector
  • Resources
    • Job descriptions
    • Practical information
    • Cyber security glossary
    • AI Glossary
    • Newspapers
    • Quiz
  • Our experts
  • en_GBEN
    • fr_FRFR
    • es_ESES
    • nl_BENL
EBIOS, ISO 27001 or ISO 27005: which method to use to manage cybersecurity risks?

EBIOS, ISO 27001 or ISO 27005: which method to use to manage cybersecurity risks?

by ORSYS Editorial Board | 21 January 2025 | Featured article, Cybersecurity, Information system, Digital technologies

Share this page:EBIOS, ISO 27001 or ISO 27005: these three approaches are used to identify, assess and control the threats to your information system. Which one should you choose? Which is best suited to your organisation...
AI and cybersecurity: weapon or shield for your organisation?

AI and cybersecurity: weapon or shield for your organisation?

by Cédric VASSEUR | 14 January 2025 | Cybersecurity, AI and big data, White papers, Resources

Share this page :AI is revolutionising cybersecurity for better... and for worse! Is it a new weapon in the hands of cybercriminals or an effective shield protecting our systems?
Cybersecurity: dealing with the quantum threat

Cybersecurity: dealing with the quantum threat

by ORSYS Editorial Board | 11 October 2024 | Featured article, Cybersecurity, Digital technologies

Share this page:With unprecedented computing power, the quantum computer could break current encryption algorithms, thereby compromising the security of sensitive data in the...
Solution to the cybersecurity game - word search - ORSYS Le mag n°5

Solution to the cybersecurity game - word search - ORSYS Le mag n°5

by ORSYS Editorial Board | July 12, 2024 | Cybersecurity, Digital technologies

Share this page : Here is the solution to the cybersecurity game - word jumble - in ORSYS Le mag's Journal No. 5, special cybersecurity edition. Here is the list of the 33 words in the...
OSINT, cyber intelligence techniques at the service of your business

OSINT, cyber intelligence techniques at the service of your business

by ORSYS Editorial Board | June 28, 2024 | Featured article, Business intelligence, Cybersecurity, Digital technologies

Share this page:Open source intelligence (OSINT) is emerging as a formidable set of techniques for collecting and analysing information available on the Internet. In cybersecurity, competitive intelligence and risk management, OSINT is...
NIS 2: how do you prepare to apply the new cyber security directive?

NIS 2: how do you prepare to apply the new cyber security directive?

by ORSYS Editorial Board | 3 June 2024 | Featured article, Cybersecurity, Digital technologies

Share this page:The countdown is on: there are just 5 months to go before the NIS 2.0 directive on cybersecurity comes into force. These European regulations will also apply to...
Good backup practices: the 3-2-1-1-0 rule

Good backup practices: the 3-2-1-1-0 rule

by ORSYS Editorial Board | March 29, 2024 | Featured article, Cybersecurity, IS Management, Digital technologies, Virtualisation, cloud, DevOps

Share this page:Ransomware, a corrupted database, malicious internal activity or a simple water damage can threaten your data and paralyse your business. However, there is a simple and effective...
ORSYS Le mag crossword solution n°1

ORSYS Le mag crossword solution n°1

by ORSYS Editorial Board | October 1, 2023 | Featured article

Didn't find all the answers? It doesn't matter, follow one of our 170 cybersecurity training courses in our Cyber Academy Network/Internet cybersecurity, CISSP overview, IS security, preparation for Fortigate I and II certification, preparation...
Which IT certification is most beneficial for your business?

Which IT certification is most beneficial for your business?

by ORSYS Editorial Board | September 25, 2023 | IT Certifications, Cybersecurity, Training, Project management, IS Management, Information system, Digital technologies, Virtualisation, cloud, DevOps

Share this page:Each IT profession has its own professional requirements, and companies are increasingly asking for certifications to prove that they have mastered specific skills. PMP, ITIL, Scrum, CISSP,...
Cybersecurity automation: what expectations, what limits?

Cybersecurity automation: what expectations, what limits?

by ORSYS Editorial Board | September 8, 2023 | Cybersecurity, Digital technologies

Share this page:Improving the productivity of cyber analysts by relieving them of repetitive and time-consuming tasks: this is the main promise of automation. But beyond this...
IS governance: involving business units in corporate security

IS governance: involving business units in corporate security

by Stéphane GARREAU | August 17, 2023 | Cybersecurity, IS Management, Information system, Digital technologies

Share this page:Cyber risk management is now managed at the highest level of the company, in the form of information systems security governance. Its role is to...

ORSYS white logo

Who are we?

Group websites

ORSYS France
ORSYS Belgium
ORSYS Luxembourg
ORSYS Switzerland
ORSYS Spain
ITTCERT by ORSYS

Our 42 training centres

Map of ORSYS training centres

Contacts

Editorial
Press
Community manager

Follow us

  • Suivre
  • Suivre
  • Suivre
  • Suivre

2025 ORSYS | Legal notice | Privacy and data management policy

ORSYS le mag 2025 logo


Would you like to receive our news?

I'm interested in :

By submitting this form, you agree to receive our news related to the topics selected below. You can unsubscribe at any time, simply by clicking on the unsubscribe link included at the bottom of each of our communications. To find out more, visit our RGPD.