Tag: IAM

The evolution of the NIST password complexity rules: a mandatory step before a passwordless world?

Using passwords introduces both a large attack surface (phishing, brute force, password spreading, rainbow table, etc.) and a poor user experience. As a result, passwords have been denounced in favour of passwordless technologies for several years. However, passwords remain commonly…

Wavestone publishes its 2020 Belgian Cybersecurity Startup Radar

For several years now, Wavestone's different offices have been periodically identifying startups active in the field of cybersecurity. Wavestone Brussels office has therefore carried out its very first census in this field: the 2020 Belgian Cybersecurity Startup Radar.   A proven…

Quelle approche pour gérer les identités et les accès sur les infrastructures critiques ?

La Loi de Programmation Militaire (LPM) 2014-2019 et les arrêtés sectoriels associés, ainsi que la déclinaison française de la directive européenne NIS, consacrent une place importante à la gestion des identités et des accès sur les infrastructures critiques. En effet,…

Back to top