Quantum computing, still in its infancy, already poses a credible threat to the traditional cryptographic algorithms on which information system security is based. Faced with this prospect, post-quantum cryptography (PQC) is no longer a theoretical possibility: it is...
The value of Threat Intelligence in SIEM and SOC environments is well established. But did you know that this flow of information, which plays an essential role in anticipating, detecting and neutralising cyber-attacks, can also enhance the capabilities of your Next...
In a context where industrial infrastructures are increasingly interconnected, managing access to control systems (SCADA, PLC, DCS, etc.) has become a key issue in operational cybersecurity. Remote access, external maintenance, network segmentation, user rights: the...
With cyberattacks on the rise and increasingly targeting smaller organisations, SMEs/SMIs and local authorities are now seen as the weak links in cybersecurity. Limited resources, heterogeneous infrastructure and a lack of awareness mean that these players are highly...