Excellium Services Belgium

by mrahier96 mrahier96 No Comments

Cyber Incident Handling: dos and don’ts!

Intro

In today’s article, we will discuss the good and bad practices when facing a major incident.

Facing an incident is stressful for both : the victim and incident handlers. Therefore, to reduce the impact of that stress, we need to understand what are the good practices to adopt and what are the poor decisions one may make under the effect of the stress.

As for an example of an incident, we will run through a Human Operated Ransomware case scenario and see what could lead to a longer analysis time, communication difficulties, or at worst, your infrastructure being compromised again after the first attack.

Read more

by mrahier96 mrahier96 No Comments

Excellium Services Announces Partnership with Pentera to Expand Security Portfolio with Automated Security Validation

Contern, Luxembourg, July 11, 2023 – Excellium Services S.A., a leading cybersecurity services provider in Belgium and Luxembourg part of Thales Group, today announced a partnership with Pentera, the leader in automated security validation. Pentera’s platform will strengthen Excellium’s strong list of services, addressing the growing demand for automated security validation for enterprises in Belgium and Luxembourg.

Read more

by mrahier96 mrahier96 No Comments

Daily Life in the SOC – Level 1 Analyst

The Level 1 CSOC Analyst Team is at the forefront of the Excellium Cyber Security Operations Centre. These analysts, also known as first responders, work in 8-hour shifts every day of the year to ensure full-time coverage of infrastructure and guarantee that there is always someone ready to act; no matter the time or day. The actual number of people on any given shift is increasing to meet the growing needs of the expanding client base as well as influxes in activity caused by external circumstances such as the Russo-Ukrainian war or American presidential election.

With that said, what exactly does a level 1 analyst do?

Read more

by mrahier96 mrahier96 No Comments

Discovery of Cloud Native applications from an application security perspective

Context of the blog post

This article is based on my understanding of what is a Cloud Native application. This knowledge is mainly based on the reading of the following sources:

🎯 My goal was to try to identify which aspects of the security of an application change when an application is intended to be Cloud Native.

📍 From here, a Cloud Native Application will be called a CNA.

Read more

by mrahier96 mrahier96 No Comments

Cloud Migration Challenges

One of the most widely used technologies today is cloud computing, where workloads are hosted by vendors and accessed via the Internet automatically, without provider’s interaction at anytime and anywhere.

Cloud migration challenges - Excellium Services Belgium

Read more

Top