Tag: risk

How to define an effective third-party cyber risk management strategy?

More and more clients request our help regarding their third-party cyber risk management strategy. Indeed, third parties constitute a privileged attack vector. A recent study from Soha Systems showed that 60% of security incidents involve directly or indirectly a supplier.…

Deep dive into deepfake – How to face increasingly believable fake news? (1/2)

Online media and social networks expand the attack surface usable by the malicious actors, and deepfakes are the ultimate weapon. Well-known as a disinformation tool for the society, they bring about other risks to be considered by businesses. The recent…

Saga (3/3) – Feedback from the field and good practices for the protection and the security maintenance of industrial ISs

We have seen through the previous articles the solutions allowing to initiate the security of Industrial IS. Once this securing has been achieved, the maintenance in security conditions must be ensured as well as the implementation of detection means. Managing…

Back to top