Our Latest Posts

Cryptobox is a new secure collaborative solution enabling employees to securely share information internally and externally. Provided by Ercom, a company specializing in secure communications for nearly 30 years, Cryptobox ensures businesses can exchange information confidentially using end to end encryption. Easy to use and easy to deploy, Cryptobox is available on all types of hosting…

Data management is now at the heart of corporate strategies. Even if the cloud fulfills its promises in terms of access flexibility and cost of storage, not all software solutions are suitable for professional use. Due to tighter EU data legislation and increasing exposure to data loss, Ercom is now launching Cryptobox, the first secure…

Millions of professionals use these services every day to share data. But do they really provide the kind of security adapted to professional use? Unfortunately no. Bad habits die hard Who during the course of their business has never shared a document on Google Docs, shared a folder on Dropbox, or used the WeTransfer service…

According to a study published in 2015 by Capgemini, over 90% of French companies have already fallen victim to a cyber-attack. This is not so surprising considering cyber-attacks are exploding throughout the world (+38% according to PwC) and especially in France (+51%) in 2015. Beyond the growing volume of data being processed, increased in mobility…

Average cost of a data breach for a company? 4 million dollars according to a study conducted by IBM in 2016. Enough to give corporate executives a cold sweat, especially as cyber-attacks keep growing, particularly in France… 2016 promises to be a record year PricewaterhouseCoopers estimates that the number of cyber-attacks increased by 38% worldwide…

Awaiting 5G… 4.5G?


30 August 2016

In previous posts were covered the questions operators are wondering about: to address some issues related to capacity and quality in the context of the Internet of Things, connected cars or merely image and video transmission over mobile networks. During the Mobile World Congress, which took place in February in Barcelona, the expected 5G stall…

There has been a recent trend toward FabLabs, Hackerspaces and other MakerSpaces. In 2012, an interesting thesis from Francis Botollier-Depois (HEC) http://appli6.hec.fr/amo/Public/Files/Docs/276_fr.pdf described them as such: “These innovation spaces allow users to build almost anything using digital tools. But beyond being a simple workshop, MakerSpaces are also places of socialization in a counterculture. Open to…

In a previous post, the best of compromised objects have been presented. In this post, the focus is put on the best of hacking tools. Of course, this best of will not be complete, but it seems interesting to draw your attention to 4 uncommon objects: a pita bread, a Bluetooth keyboard, a Pringles box…

In a previous post, the idea that the IoT could be operating on dedicated networks has been discussed. Today, let’s focus on 4G+ and 5G networks’ ability to handle the rising trend of current traffic, paired with the additional traffic generated by smart objects. The IoT will soon be pervasive in our daily personal and…

Common criteria


15 June 2016

The ANSSI defines multiple levels of security for hardware involved in information and mobile networks security*: elementary qualification, based on a CSPN (Level-1 security certification); standard qualification, based on a Common Criteria evaluation EAL3+; enhanced qualification, based on a Common Criteria evaluation EAL4+. Common Criteria are a set of standards (ISO 15408), created by a…