Our Latest Posts
Article from Security Intelligence : How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability
6 April 2017 - Uncategorized
February 28, 2017 | By Rick Robinson from Security Intelligence Organizations are adopting encryption at a rapid and increasingly urgent pace. Why? Because encryption helps organizations support dynamic industry regulations while also protecting sensitive data that’s placed in the cloud. The trend of adopting public cloud solutions continues to grow, but protecting critical data in … Continue reading Article from Security Intelligence : How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability
6 December 2016 - Security
Cryptobox is a new secure collaborative solution enabling employees to securely share information internally and externally. Provided by Ercom, a company specializing in secure communications for nearly 30 years, Cryptobox ensures businesses can exchange information confidentially using end to end encryption. Easy to use and easy to deploy, Cryptobox is available on all types of hosting … Continue reading Cryptobox: the new secure data sharing solution for professionals
Data management is now at the heart of corporate strategies. Even if the cloud fulfills its promises in terms of access flexibility and cost of storage, not all software solutions are suitable for professional use. Due to tighter EU data legislation and increasing exposure to data loss, Ercom is now launching Cryptobox, the first secure … Continue reading Cryptobox: secure Cloud for professionals
3 November 2016 - Security
Millions of professionals use these services every day to share data. But do they really provide the kind of security adapted to professional use? Unfortunately no. Bad habits die hard Who during the course of their business has never shared a document on Google Docs, shared a folder on Dropbox, or used the WeTransfer service … Continue reading Are you using Dropbox, Google Docs, or WeTransfer…? If so, you should read this.
According to a study published in 2015 by Capgemini, over 90% of French companies have already fallen victim to a cyber-attack. This is not so surprising considering cyber-attacks are exploding throughout the world (+38% according to PwC) and especially in France (+51%) in 2015. Beyond the growing volume of data being processed, increased in mobility … Continue reading 90% of French companies have already fallen victim to a cyber-attack
Average cost of a data breach for a company? 4 million dollars according to a study conducted by IBM in 2016. Enough to give corporate executives a cold sweat, especially as cyber-attacks keep growing, particularly in France… 2016 promises to be a record year PricewaterhouseCoopers estimates that the number of cyber-attacks increased by 38% worldwide … Continue reading Cost of a data breach: 4 million dollars!
30 August 2016
In previous posts were covered the questions operators are wondering about: to address some issues related to capacity and quality in the context of the Internet of Things, connected cars or merely image and video transmission over mobile networks. During the Mobile World Congress, which took place in February in Barcelona, the expected 5G stall … Continue reading Awaiting 5G… 4.5G?
There has been a recent trend toward FabLabs, Hackerspaces and other MakerSpaces. In 2012, an interesting thesis from Francis Botollier-Depois (HEC) http://appli6.hec.fr/amo/Public/Files/Docs/276_fr.pdf described them as such: “These innovation spaces allow users to build almost anything using digital tools. But beyond being a simple workshop, MakerSpaces are also places of socialization in a counterculture. Open to … Continue reading MakerSpace: fad or real innovation space?
In a previous post, the best of compromised objects have been presented. In this post, the focus is put on the best of hacking tools. Of course, this best of will not be complete, but it seems interesting to draw your attention to 4 uncommon objects: a pita bread, a Bluetooth keyboard, a Pringles box … Continue reading The best of hacking tools
In a previous post, the idea that the IoT could be operating on dedicated networks has been discussed. Today, let’s focus on 4G+ and 5G networks’ ability to handle the rising trend of current traffic, paired with the additional traffic generated by smart objects. The IoT will soon be pervasive in our daily personal and … Continue reading The IoT’s* impact on provider networks