10 simple tips for spotting e-mail attacks (phishing and ransomware)
The most common cyberattack scenarios for SMEs
Understanding EDR, SIEM, SOAR and XDR: the complementary nature of cyber defense
Cyber news
Antivirus vs. EDR: why companies need a paradigm shift?
Security Policy Development
Best Practices for Securing Wi-Fi Networks
Facility Security
Email Security
Mobile Device Security (MDM)
Why and how to back up your business data?
Conducting a Cyber Crisis Management Exercise
Performing a Risk Analysis
What is a VPN?
Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP)
Pentest
Implementation of Detection Tools
Social Engineering
ISMS implementation
Access Management
Double authentication
Communication during a cyber crisis: What to say?
Phishing campaign
Enterprise Secure Messaging Applications in 2024
Zero Trust, a permanent challenge
VSEs: Securing themselves is essential to guaranteeing their prosperity
My CISO is absent. What can I do?
Opt for an outsourced CISO
SMEs: a guide to cyber security in 2024
The main cyber threats to businesses in 2024
What is OSINT (Open Source Intelligence)?
Mots de Passes, the guide to creating strong passwords in 2024
Artificial Intelligence for Cybersecurity
Emerging trends in cybersecurity
Safety of Connected Objects
Olympic Games 2024, the great threat
ETI: the 2024 cybersecurity guide
E-reputation, the great threat to companies
CyberHarassment, What is cybersecurity?
CISO, communicating with teams and management
Cybersecurity
PhishiaSOC
Crisis management
Prevention
Outsourced CISO
AI
ISO 42001 & SMIA support
CSR
Carbon Footprint Assessment and Climate Strategies
Life Cycle Analysis and Eco-design
Support for CSRD compliance
Sustainable cybersecurity
Managed SOC
Who we are
Join us
All articles
Cybersecurity blog
Blog IA
Sustainability blog