Share this page:EBIOS, ISO 27001 or ISO 27005: these three approaches are used to identify, assess and control the threats to your information system. Which one should you choose? Which is best suited to your organisation...
Share this page :AI is revolutionising cybersecurity for better... and for worse! Is it a new weapon in the hands of cybercriminals or an effective shield protecting our systems?
Share this page:With unprecedented computing power, the quantum computer could break current encryption algorithms, thereby compromising the security of sensitive data in the...
Share this page : Here is the solution to the cybersecurity game - word jumble - in ORSYS Le mag's Journal No. 5, special cybersecurity edition. Here is the list of the 33 words in the...
Share this page:Open source intelligence (OSINT) is emerging as a formidable set of techniques for collecting and analysing information available on the Internet. In cybersecurity, competitive intelligence and risk management, OSINT is...
Share this page:The countdown is on: there are just 5 months to go before the NIS 2.0 directive on cybersecurity comes into force. These European regulations will also apply to...
Share this page:Ransomware, a corrupted database, malicious internal activity or a simple water damage can threaten your data and paralyse your business. However, there is a simple and effective...
Didn't find all the answers? It doesn't matter, follow one of our 170 cybersecurity training courses in our Cyber Academy Network/Internet cybersecurity, CISSP overview, IS security, preparation for Fortigate I and II certification, preparation...
Share this page:Each IT profession has its own professional requirements, and companies are increasingly asking for certifications to prove that they have mastered specific skills. PMP, ITIL, Scrum, CISSP,...
Share this page:Improving the productivity of cyber analysts by relieving them of repetitive and time-consuming tasks: this is the main promise of automation. But beyond this...
Share this page:Cyber risk management is now managed at the highest level of the company, in the form of information systems security governance. Its role is to...