We’re available from 9 am to 6 pm on weekdays. Contact Us.
Security

Technology Vision #2: Ecosystems

Companies are increasingly integrating their core business functionalities with third parties and their platforms.

Security

5th Splunk Free IT Workshop “Data analysis with splunk”

All the applications, servers and network devices in your IT infrastructure generate valuable data for managing, securing and auditing. But using this data is time-consuming and painful, because it’s locked in silos of departments and technology scattered throughout the organisation.

Security

Deloitte named a global leader in Enterprise Risk Management Consulting

ALM Intelligence has named Deloitte a global leader in Enterprise Risk Management (ERM) Consulting. In the report entitled The ALM Vanguard—Enterprise Risk Management Consulting 2017, ALM Intelligence notes, “Deloitte looks to build risk-intelligent organizations by helping clients transform their risk management functions from bolt-on activities focused on value protection to ones that permeate organizational efforts to create value.

Security

Bitstamp & Caceis to launch corporate Bitcoin investments

Bitstamp, the EU’s first and only fully licensed bitcoin exchange, and CACEIS, the leading European asset servicing bank that is part of Crédit Agricole SA, are today announcing that they will be providing a secure route for corporate bitcoin investments.

Security

LuxTrust : des services novateurs pour aider l’économie luxembourgeoise

LuxTrust, leader de l’identité numérique et des services de confiance au Luxembourg et y ayant introduit la signature électronique il y a dix ans, propose désormais de nouveaux services à haute valeur ajoutée à destination des entreprises luxembourgeoises : l’horodatage qualifié garantissant l’existence d’un document à un moment donné et le cachet électronique pour certifier l’intégrité de documents.

Security

Vault7 : Apple a corrigé les failles exploitées par la CIA

WikiLeaks a révélé que la CIA était capable de pirater n'importe quel smartphone ou ordinateur en exploitant plusieurs failles. Apple a annoncé que la plupart vulnérabilités ont été corrigées dans le dernier iOS.