OpenAI’s flagship ChatGPT was over the news 18 months ago for accidentally leaking a CEO’s personal information after being asked to repeat a word forever. This is among the many exploits that have been discovered in recent months. Figure 1…
Tag: risk
The banking sector has rapidly modernized, and online banking has become a matter of course for both banks and their customers. These players are increasingly reliant on the Internet, with all the advantages that implies, but also the risks. At…
An overview of the different cybercriminal uses case of ChatGPT The one year report about the cyber operations between Ukraine and Russia, by the CERT-EU CHATGPT What opportunities for the underground world of cybercrime ? Need a refresh about…
Backup security is a topic of increasing concern to large accounts, often as part of initiatives to improve their cyber-resilience. When all the protection, detection and response measures have not been sufficient: the information system must be restored quickly from…
Wavestone and Sigfox share a common passion for tech, innovation and security. Our discussions led us to explore the foundation of all cybersecurity initiatives (the risk analysis), why this is different for an IoT project and, most importantly, how you…
If we have seen in a previous article the predominance of FAIR in the world of quantification[1], another article published here in early June[2] (detailing the FAIR method in its second part) emphasizes the care to be taken in the…
A few months ago, François LUCQUET and Anaïs ETIENNE told us of the growing interest in quantifying cyber risks[1], but also warned us against going to the path of quantification without prior reflection. Their analysis, which is still relevant, emphasized…
More and more clients request our help regarding their third-party cyber risk management strategy. Indeed, third parties constitute a privileged attack vector. A recent study from Soha Systems showed that 60% of security incidents involve directly or indirectly a supplier.…
This year has been exceptionally trying for individuals, businesses and governments globally. Living and working in a crisis mode introduced an array of challenges, with some firms dealing with them better and faster than others. What is the common denominator?…
How can the ISO 27001 framework be used to continuously improve the security level? In a previous article, we told you all about the new European NIS directive and Belgium's choice to use the ISO 27001 standard as a basis…