We’re available from 9 am to 6 pm on weekdays. Contact Us.
Security

Smart cities: The correlation of cause and effect

The concept of a ‘smart city’ can be seen as a cluster of city improvement plans that address multiple challenges. These can relate to transport, mobility, air quality, noise levels, water management, architectonic barriers, maintenance optimization, street and outdoor lighting, urban development, and other areas. These aspects are ultimately all related to each other – the amount of traffic, for example, has an effect on air quality and noise levels – but with many other factors also thrown in, understanding the exact correlation of cause and effect is a complex task.

Security

Detect threats faster with Cisco StealthWatch

The third Cisco Identity Service Engine (ISE) workshop organised by Dimension Data demonstrated to participants how StealthWatch detects threats, malware infections and significantly limits their cost and downtime impacts on business.

Security

Delivering aerial security through drone monitoring

The use of drones – also known as unmanned aerial vehicles (UAVs) – is becoming ever more widespread across multiple industry sectors. While the majority of users of drones are doing so responsibly, and most applications and uses are having a positive impact, their use isn’t without issues. Because drones can be used as a mobile ‘flying eye’ to deliver video footage or pictures from the sky, they have the potential to be used in corporate espionage or to identify security weaknesses. They can also be used as a mobile and remote delivery tool for illicit goods, or even present a direct attack threat. More innocently – but no less dangerously – drones can present a safety risk when unwittingly flown into airspace where other airborne traffic exists, or to personnel on the ground. As such, organizations need to recognize this new threat, and put in place measures to monitor drones and control them from ground level.

Security

From WannaCry to WannaKnow?

By Rudolph Bos, Head of Enterprise & Cyber Security Benelux, Fujitsu. WannaCry, the most recent malware hype, has not been very lucrative and it hasn’t even had half the impact it could have had if the malware authors had designed their product and planned their actions a bit more professionally. Nevertheless, it was enough to create a worldwide panic attack which has led to equally unprofessional behavior.

Security

Fireball and WannaCry Impact More Than 1 in 4 Organizations Globally

Check Point® Software Technologies Ltd. (NASDAQ: CHKP) has revealed that more than one in four organizations globally was affected by the Fireball or WannaCry attacks during May, in the company’s latest Global Threat Impact Index. 

Security

Chain Reaction: The New Wave of Mobile Attacks

The main purpose of any business is to grow and be more successful – and that applies to criminal organizations just as much as it does to legitimate companies.  Cybercriminals have found that attacks specifically targeting smartphones and tablets, particularly those that incorporate a ransomware payload, are effective and profitable – which is why the volume of malware targeting users of mobile devices trebled during 2015.

Security

Sécurité physique : la cybersécurité est-elle vraiment un enjeu dans ce domaine également ?

Nous sommes tous sensibilisés à l'importance de la cybersécurité. Elle est en effet souvent au cœur des gros titres de la presse nationale : vulnérabilités de systèmes administratifs de l'État, cyberterrorisme ou vol massif de coordonnées bancaires de clients de grandes enseignes par des organisations criminelles font régulièrement la une des journaux. Mais au même titre que la sécurité des espaces physiques, seuls les manquements à la cybersécurité font l'objet d'articles de presse.

Security

Le ransomware WannaCry n’a pas épargné le domaine de la santé

Dans le contexte actuel où les menaces liées à la sécurité des systèmes d’information sont de plus en plus nombreuses, les établissements de santé ne sont pas épargnés. En effet, la haute sensibilité des données médicales couplée à l’importante digitalisation des processus font des établissements de santé des cibles privilégiées.

Security

La semaine de la sécurité pour OXiane

OXiane, en collaboration avec son partenaire Excellium, sera présent ce 15 juin toute la journée à la « Rencontres de la Sécurité 4 » au Domaine Thermal de Mondorf-les-Bains, un forum d'échanges et de réflexions sur les tendances de la Cybersécurité. N’hésitez pas à venir rendre visite à l'équipe OXiane sur son notre stand !

Security

Phishing attacks on the rise

Over the past years, phishing and ransomware have become the most rampant form of cybercrime and an exponentially increasing threat to organizations. Ransomware, a form of malware designed for the sole purpose of extorting money from victims; and phishing, the delivery mechanism of choice for ransomware and other malware, are critical problems that every organization must address through a variety of means. The good news is that there is a lot that organizations can do to be resilient against such threats. In this series of three articles, explore the challenges raised by phishing and ransomware attacks and learn how to protect your business from these threats. After our first article focusing on ransomware, this second article focuses on phishing risks.

Security

Phishing and ransomware can be your worst nightmares, how can you prevent these evolving threats?

Over the past years, phishing and ransomware have become the most rampant form of cybercrime and an exponentially increasing threat to organizations. Ransomware, a form of malware designed for the sole purpose of extorting money from victims; and phishing, the delivery mechanism of choice for ransomware and other malware, are critical problems that every organization must address through a variety of means. The good news is that there is a lot that organizations can do to be resilient against such threats. In this series of three articles, explore the challenges raised by phishing and ransomware attacks and learn how to protect your business from these threats. This first article focuses on ransomware risks.

Security

Achieving a digital transformation: a security challenge

Data, the new oil of the digital era, is deeply transforming entire ecosystems and business models. Cybersecurity has therefore become a key issue for the development of companies and economies. A few weeks ago, EBRC – European Business Reliance Centre – announced a strategic alliance with Digora, a French data management expert, which strengthens EBRC’s competencies and international presence. In a world where digital transformation impacts any sector, data is more than ever considered as the oil of the 21st century. BEAST met with Yves Reding, CEO of EBRC, to discuss data’s added value, management and protection.