Blog
Your iPhone is (in)secure
iPhone is considered the most unhackable smartphone, especially thanks to the fact that it is a closed OS so nobody…
Don’t feed the Phish!
As you all should know nowadays, a phishing attack is a fraudulent attempt to obtain sensitive information such as usernames,…
Steganography and Cyberattacks
What is steganography? It consists in concealing a message within another message. It is a combination of two Greek words:…
The state of AI in cyber security
With so much hype over these last years in Artificial Intelligence, it makes us wonder whether AI is already prepared…
Awareness is life
Did you know that most of cybersecurity breaches are due to human error? Social engineering is a current favourite tactic…
Identity and Access Management
The identity life cycle in a company context is a term used to define the complete cycle of the identification…
Forseti Security for Google Cloud Platform (GCP)
Metallica sang in “…And Justice for All”: “Hammer of justice crushes you overpower”, so who’s better to judge us than…
"U.S. CEOs rank cyber security as their #1 external concern for 2019"
These days you can read about the economic forecast, and no one is optimistic. The commercial war unleashed by Trump…