The European Union Agency for Cybersecurity (ENISA) launches the activities of the European Cybersecurity Month (ECSM) (...)
Founded in the United States 6 years ago, Armis was created to respond to the issues of threats to connected objects (IoT, (...)
On the occasion of FIC 2022, Stamus Networks will showcase the latest iteration of Stamus Security Platform which is a (...)
Threat detection is harder today than it was two years ago. Next year will be harder than this year. Why? It’s a compounding effect from skills (...)
By now, consumers are familiar with using biometrics to open their phones, approve payments and access products and shops. But what about using (...)
Alarm systems are essential for the economic success of almost all sectors of European markets. Rapid technological developments and policy (...)
Of all the security issues that have appeared over the last few years, none has had the impact of the Log4j exploit. Also called the Log4Shell, (...)
Hackers go after healthcare because patient data and hospital systems are lucrative prey. Hackers know they can demand a high ransom if they (...)
Smishing, a cyberattack strategy that combines SMS (short message service, also known as text messages) and phishing, has been revealed as a new (...)
Identity & Access Governance is a must for every business. Unfortunately, the way it is commonly done today is inefficient and cumbersome. It is latest time to review the approaches on Identity & Access Governance and implement lean (...)
Small and Mid-sized Businesses (SMBs) athenticate their end-users primarily with passwords, in spite of the fact that passwords are less secure, inconvenient, and in fact more expensive than stronger forms of authentication. Compared to larger (...)
New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr