Blog

by adidionxlm adidionxlm No Comments

Excellium services newsletter : Cloud adoption

Nowadays more and more organizations are choosing cloud services for their operations.

Software publishers spotlights their solutions in I-P-S aaS models and they no longer automatically offer on-premises products. Indeed, challenges and issues of the Day for organizations are to reduce IT operating costs, increase collaborators’ mobility, while maintening availability of their business services.

In this context of relative outsourcing, cloud computing must be considered as a form of outsourcing, but risks and security measures are different from classic outsourcing.

Read more

by adidionxlm adidionxlm No Comments

Excellium services newsletter : Content-Security-Policy header

Since the web 2.0, website use more code and resources on client side. This is due to the large number of JavaScript library which allow to have beautiful website with animation and live updating. The JS is present on most website. To use this JS, when the browser downloads the html page, it looks if it need to load other resources like images, style sheet or JS. When all elements are loaded, the browser render the website and run the JS on the client computer.

Read more

by adidionxlm adidionxlm No Comments

Threat Landscape Report – S21sec – First semester 2019

Cybersecurity has become one of the main concerns of Management Committees and management teams.

Inline with the SONAE IM’s cybersecurity strategy, Excellium and S21Sec are partnering in the cybersecurity space to offer you a six-month report explaining those existing threats that may jeopardize the safety of companies and individuals.

Read more

by adidionxlm adidionxlm No Comments

Excellium services newsletter : Password Stealers

Password Stealers refers to features in malware or a family of malware, around for more than a decade now. The antivirus may detect them as Password Stealers (PWS), Passwords (PSW) or Information Stealer. These kind of malware are legions. Some, like Pony, may be well known, but others like Azorult or Diamond Fox are almost unknown.

Read more

by adidionxlm adidionxlm No Comments

Quand la cybersécurité s’invite au board…

De plus en plus souvent, c’est au niveau du conseil d’administration que les questions de cybersécurité sont évoquées. Pour les responsables de la sécurité informatique, c’est une opportunité de défendre leur vision auprès des décideurs… Toutefois, s’adresser aux dirigeants ne s’improvise pas !

Read more

by adidionxlm adidionxlm No Comments

Comment Encevo veille à la sécurité de ses activités critiques

En trois ans, accompagné par Excellium, le Groupe Encevo a entièrement repensé sa manière d’appréhender les enjeux de cybersécurité. Prenant conscience des risques systémiques liés à ses activités de leader de l’énergie au Luxembourg, le groupe s’est inscrit dans une démarche d’amélioration continue de la sécurité informatique, qui tient compte des contraintes de chaque entité et qui veille à supporter le développement des activités. Évocation de cette transformation avec Jean-Marc Verdure, CIO, et Yannick Baudesson, CISO du Groupe Encevo.

Read more

Top