Mobile Threat Defense Guide 2018

Posted by Roxane Suau on May 31, 2018

Our highly digital world has fundamentally changed companies’ organization. Smartphones and tablets are now at the center of our personal and professional usages, with an average of 5 hours per day spent on them. In constant demand of immediacy, the new employee is mobile, flexible and always connected.

Read More

Mobile Data, a Structuring Piece of Organizations GDPR compliance [INFOGRAPHIC]

Posted by Roxane Suau on March 22, 2018

The digital transformation has created a cloud-first and mobile-first world, greatly increasing the amount of mobile data transiting between mobile devices, computers, servers, etc. As a result of companies digitalizing their frameworks and services, corporate and personal data are now extensively accessed by mobile devices. This evolution is exposing them to a whole new range of risks: Malware, data leakage, vulnerabilities, network exploits, etc.

Read More

Blockchain: The cybersecurity revolution with its strengths and weaknesses

Posted by Clément Saad on March 08, 2018

Sometimes it's unfortunate that technical terms, often with technological input, are emptied of meaning by inappropriate marketing uses. It has been some time since I gave up fighting the misuse of the term "innovation" and now deplore the overuse of artificial intelligence.

Read More

Mobile Apps: The Line Between Convenience & Data Leakage

Posted by Vivien Raoul on November 15, 2017

 

Read More

Man-In-The-Middle Attack: Stealing Data Through The Network

Posted by Roxane Suau on November 02, 2017

Smartphones and tablets have become the first point of access to the internet. This evolution has led to the creation of many Wi-Fi networks so people can connect from almost anywhere, but it opens a new playground for hackers. The growing amount of public networks and users who get connected to them has increased Man-In-The-Middle attack opportunities.

Read More