- October 08, 2021
- Tech
- Data
- Cloud
- Luxembourg
- Security
- Startup
- Development
- Digital
Impact du RGPD sur la vidéosurveillance
Par Edwin Roobol, Regional Director Middle Europe, Axis Communication.Bientôt, le 25/05 prochain, le nouveau Règlement général sur la protection des données (RGDP) entrera en vigueur. Ce règlement aura un impact sur toute activité collectant ou traitant les données personnelles de personnes résidant dans l’Union européenne (UE).
Fujitsu Bolsters Global Managed Security Service for Comprehensive Defense against Diversifying Cyberattacks
Fujitsu today announced that it is expanding its Fujitsu Security Solution Global Managed Security Service, which provides centralized lifecycle support, from cyberattack prediction to system restoration. The company is strengthening endpoint and cloud security, and will provide analyses of threat information from the dark web.
Luxtrust sélectionné pour fournir des services sécurisés pour un système sanitaire de l'UE
Il y a près de 13 ans, la Commission européenne avait lancé un outil de gestion multilingue en ligne afin de satisfaire les exigences sanitaires du commerce intra-UE et de l’importation d’animaux, de denrées alimentaires, d’aliments pour animaux et de plantes.
Trend Micro met l’analyse de style pilotée par l’IA au service de la lutte contre la “fraude au CEO”
Trend Micro, leader mondial dans le domaine des solutions de cyber-sécurité, annonce sa nouvelle solution Trend Micro Writing Style DNA. Elle permettra aux sociétés d’être mieux armées contre la fraude au CEO. Cette innovation, basée sur l’intelligence artificielle (IA), sera intégrée dans toute une série de produits afin d’avertir l’utilisateur lorsque le système soupçonne que des courriels frauduleux soient prétendument envoyés par le CEO ou d’autres membres de la direction.
#ISDays: the ever-growing need for cyber-security (2/2)
Several hundreds of cyber-security experts met again at the Parc Alvisse Hotel on March 29th for the second part of the IS Days. After an insightful first day of conferences, where they discussed the latest trends and solutions of the sector and attended the Information Security Gala Dinner, the gathered again to witness a new series of conference and round table discussions.
#ISDays: the ever-growing need for cyber-security (1/2)
On the first day of the 7th edition of IS Days, more than 200 ICT and cyber-security experts gathered at the Parc Hotel Alvisse in Luxembourg to discuss the latest trends of the sector and to share their best practices, in a context seeing more and more cyberattacks being perpetrated on a daily basis.
Information Security Awards 2018: and the winners are…
On the evening of March 28th and after an insightful first day of conferences, more than one hundred ICT and cybersecurity experts gathered at the Hotel Parc Alvisse to attend the Information Security Awards gala dinner where the best practices and solutions were recognized by professionals of the sector. Find out below who the winners of the 2018 edition are.
Could overreliance on detection be unwise?
by IMRIM. So you have a SIEM. Or you have externalized your monitoring operations to a third-party Security Operations Center aka a SoC? But, did you address other essential defense components that are required to build an efficient defense strategy?
Entering the Era of Cyber-Resilience
As they navigate through an uncertain torrent of cyber-threats, companies all over the world encounter difficulties and attacks on a daily basis. They need to be prepared in order to properly respond to these attacks but also to recover as quickly as possible from them. In the context of digital transformation, which necessarily means more sophisticated cyber-attacks coming along, EBRC – European Business Reliance Centre – is promoting a new approach, moving from the concept of “cyber-security” to the one of “cyber-resilience”. We sat down with Yves Reding, the CEO of the Trusted IT one-stop-shop Luxembourgish-French company, to discuss the latest and future challenges of the cyber-space.
A global and local collaboration aimed at securing data in the cloud
In a few days, IT One will organize the seventh edition of the Information Security Days. We met with Frédéric Lavend'Homme (Cybersecurity Business Lead, Dimension Data Luxembourg) and Franck Braunstedter (Senior Manager Cyber Defense & Cloud Security, NTT Security) to discuss the collaboration between their two companies and their joint offer entitled "Cloud Security". In a context where an increasing number of cyberattacks are being perpetrated, and with more companies moving to the cloud, the security of the latter must be addressed properly.
How and why rapid threat detection is needed
by Tech-IT. As a general matter, most of the companies currently have what was needed ten years ago to provide them a good level of security: solutions such as an antivirus, a firewall and a mail relay. These security controls remain important nowadays, but for years now, information security field has been forced to shift from a prevention mentality to a focus on rapid detection and in this area, many companies remain unequipped. Without a detection capacity, how to react efficiently to a threat jeopardizing the business?
Allier comptes à privilèges et environnements DevOps pour sécuriser les entreprises
par Jean-Christophe Vitu, VP Solutions Engineers, EMEA, CyberArk. Alors que la digitalisation des organisations n’est plus un “si” mais un “quand”, et que la plupart d’entre elles ont d’ailleurs déjà complètement adopté cette idée, les spécialistes de la sécurité ne cessent de constater les mauvaises pratiques de toutes parts. En effet, cette transformation s’accompagne d’une augmentation drastique des cyberattaques. Le dernier « Threat Landscape Report » publié par CyberArk révèle d’ailleurs que 61 % des entreprises françaises ne modifient pas leur stratégie de sécurité à la suite d’un piratage. Ne pas mettre en place un plan de cybersécurité et ignorer l’expérience des incidents passés est un réel risque à prendre quant à la protection des données, des infrastructures et des actifs sensibles de ces entreprises.