Boost your firewall with Threat Intelligence: it’s possible!

The value of Threat Intelligence in SIEM and SOC environments is well established. But did you know that this flow of information, which plays an essential role in anticipating, detecting and neutralising cyber-attacks, can also enhance the capabilities of your Next...

Managing access to industrial control systems: a critical issue

In a context where industrial infrastructures are increasingly interconnected, managing access to control systems (SCADA, PLC, DCS, etc.) has become a key issue in operational cybersecurity. Remote access, external maintenance, network segmentation, user rights: the...

Digital sobriety: how cyber security can play its part

At a time when the ecological transition is forcing us to rethink our digital habits, sobriety is becoming imperative. Bucking the trend, cybersecurity systems are based on increasingly heavy architectures: multiple logs, redundant infrastructure, intensive...