Filter by
Capabilities
Countries
Identity Access Governance

Identity and Access Governance: finally providing identity management eyes and ears on the ground?

Successfully addressing IAM can bring many benefits but its implementation often faces many challenges. Could Identity and Access Governance (IAG) provide the answer and assure the success of IAM projects?


Blockchain: finding the right balance between risk and innovation

Blockchain: finding the right balance between risk and innovation

This RiskInsight letter aims to interpret the evolutions concerning Blockchain and their function, to explain the risks and the documented attacks to allow you to find the right balance between risk and innovation.


The Internet of Things: the 4 security dimensions of smart devices

The Internet of Things: the 4 security dimensions of smart devices

Like all major technological revolutions, digital transformation is spreading over many areas: home automation , physical security, mobility, healthcare…


Cyber-resilience bend without breaking

Cyber-resilience: bend without breaking

Bend without breaking» this is often how resilience is presented. How does this concept apply to cyberthreats?


Targeted cyberattacks and crisis management

Targeted cyberattacks: the need to rethink crisis management

Cybercrime is on the increase, the number of attacks is growing . All types of companies and organisations (including government…


Crisis management exercises: why, how and who?

Today, more than ever, organizations are exposed to multiple risk factors, both internal and external. Recent events show us the extent to which managing crises is both sensitive and complex…


The evolution of the cybersecurity

Cybersecurity strategy: fortress approach, move over, it’s time for the airport!

Digital transformation has turned the way we create and use information security upside down. The traditional “fortress” model of a security…