Cybersecurity

Geneva Public Transport: The autonomous revolution is underway with Les Projets Niove and Ultimo!

Table of Contents In the concentrated atmosphere of the SIT laboratory of the Geneva Public Transport (TPG), exceptional advances in cybersecurity (see our other article on the subject) for autonomous vehicles are taking shape. Quentin Matthewson, Consultant at TEAM PARTNERS, takes us behind the scenes of the European Niove project and unveils the aspirations of the Ultimo project, which promise to redefine the way we think about public transport. The Geneva Public Transport SIT Laboratory: An Ideal Playground for the Cybersecurity of Autonomous Vehicles The En Chardon depot of Geneva public transport The Geneva Public Transport depot En Chardon Within the En Chardon site, the SIT laboratory of Geneva Public Transport has been transformed into an innovation hub where the Niove project has come to life. With a series of cyberattacks orchestrated on three separate environments, the researchers explored the limits of autonomous vehicle security. The full simulation allowed for actions otherwise prohibited, while the tests on Navya shuttles and in trams tested the vulnerabilities of these emerging technologies. See our article on the threats of [...]

2024-03-20T16:19:48+01:00Mar 20th, 2024|Case Studies, Digital|0 comment

Cybersecurity for autonomous cars

In recent years, technological advances have made it possible to envisage the best for autonomous cars. Since June 1, 2018, our customer Transports Publics Genevois (TPG) has obtained official authorization to launch an automated line of automated vehicles for Geneva commuters. These advances highlight cybersecurity for autonomous cars. Why have the TPG launched an autonomous car project? To improve traffic flow in the Geneva area and reduce greenhouse gas emissions, the TPG is introducing autonomous vehicles to enable users to travel at lower cost, while emitting zero carbon emissions. To bring this major project to fruition, Transports Publics Genevois had to invest 20 million euros to make it viable and secure in every respect. Cybersecurity, a little-known issue for autonomous car users The safety of the user and the surrounding environment, particularly other motorists, is the first question - and rightly so - that everyone asks. What is less obvious to everyone, however, are the cybersecurity issues associated with these autonomous vehicles. These [...]

2024-01-09T14:56:53+01:00July 3, 2023|Uncategorized|0 comment

Innovate and build the hospital of tomorrow: infrastructure, collaboration, cybersecurity, business applications, AI 

Hospital information systems are often perceived as outdated. While public hospitals do have a technical debt, their resilience and taste for innovation are well established. Based on the experience of its more than 250 customers in the healthcare sector, our subsidiary, Blue Soft Empower , in partnership with Talan, offers an innovation pathway based on four levels of hospital information system maturity. 1. building the infrastructure base and securing the hospital information system The grouping of institutions into regional hospital groups (GHT) has posed the challenge of converging hospital information systems since 2016. With staff required to work on several sites, IT departments have had to adapt with remote collaboration solutions. With the health crisis of 2020, forced telecommuting has become a necessity for some staff and inter-institutional collaboration has increased. But to achieve all of this, users must first be grouped in a single Azure Active Directory. Now that these identities are listed, they need to be secured, and this is where Defender for Identity comes in. Finally, to cover all attack surfaces and detect security events, Microsoft [...]

2024-03-11T10:30:12+01:00january 10, 2023|Uncategorized|0 comment

Cyber Resilience Act, a European regulation to ensure the cybersecurity of Edge Computing and IoT

Today, there are several regulations to secure connected objects in their use. Until now, the IoT was not secured as soon as it was produced, which created security weaknesses and therefore concerns about its development. But this time is soon over. A European regulation for cybersecurity in IoT and Edge Computing is about to be adopted. What is it? What is its purpose? We explain. The cybersecurity regulation in the IoT that may change everything Today's society is increasingly fond of new technologies, including an exaltation for connected objects. But the market is unfortunately not as controlled as it should be, and this in different areas of activity. The IoT sector is no exception. In search of cost savings, professionals or individuals favor the consumption of American or Chinese equipment. Where costs are lower but the transparency of the manufacturing process is rather opaque. Because of this lack of visibility, consumers have no control and are therefore subject to major risks. Once adopted, the Cyber Resilience Act, or European regulation for cyber resilience in the IoT, will have a major impact on the entire chain [...]

2024-01-09T15:29:05+01:00November 15, 2022|Headlines|0 comment

An efficient cybersecurity organization, opt for a DSSI

An efficient cybersecurity organization is the key to success. Putting in place the right technical solutions and raising awareness among your employees is a long way to go to become a fully cyber-resilient organization. Here are our 3 tips for achieving your digital security goals. An effective cybersecurity organization, a CISO to anticipate needs Interest in security within an organization and its systems is fairly recent. Indeed, the subject is currently under the spotlight, notably through numerous publications. But until recently, teams were brought in to manage emergencies, without having the time to plan concrete support services or recruitment processes. Today, the geopolitical context and recruitment difficulties in IT are accelerating this awareness. The notion of cybersecurity risk is therefore becoming omnipresent. That said, cyber resilience is mostly influenced by the security culture of each organization, which leaves room for disparities between each company, keeping some as inadequate to the security challenges. Today, CISOs (Chief Information Security Officers) are unfortunately plagued by ever-increasing workloads and under-investment [...]

2024-01-09T15:39:30+01:00October 3, 2022|Headlines|0 comment

The changing needs of CIOs by our Microsoft solutions specialist

In a constantly changing IT market, the needs of IT departments are becoming increasingly complex. Numerous Microsoft solutions are available, which can be adapted to each of the problems encountered by organizations. Alexandre Lamotte and Patrick Dubois, co-directors of Blue Soft Empower , our subsidiary specialized in Microsoft solutions, tell us more. The evolution of the stakes in the IT market and the needs of the IT department Organizations today have two main needs. First and foremost, organizations are looking to implement hybrid work to allow company employees to work remotely and on site. For this purpose, Teams and Viva solutions allow companies to meet their requirements. They also focus on the dimensioning of the IS to meet new business needs and the perpetual renewal of services and infrastructure solutions. In this case, it is cloud Azure that will enable organizations to meet their challenges. Despite the difficulty of predicting tomorrow's challenges, four fundamental points have been observed. First of all, data processing and business process automation for which Power Platform and artificial intelligence are adapted. We also find the agility needed in a context of merger and acquisition for which the 3 Microsoft clouds are perfectly suited. At the heart of the news and [...]

2024-01-10T14:49:33+01:00September28, 2021|Digital, The Group|0 comment

Mobile application security: vulnerabilities to watch out for

Computer systems and computers are not the only ones with security vulnerabilities: mobile devices and applications are also very vulnerable to cyber attacks. Some vulnerabilities are more frequent on this type of technical environment and it is necessary to detect them, from the creation phase of an application to the end of its life cycle. I - Security on Android and iOS: two rooms, two atmospheres On the smartphone market, two operating systems predominate: iOS and Android. In June 2021, their combined market share is 99.9% on the French market. Source : Apple or Android Nation? Statista These two operating systems have their own specificities in terms of application development. Indeed, while iOS applications are mainly programmed in Objective-C language, Java is used on Android. The same goes for their installation, configuration, programming environment, design, testing and management of the cybersecurity strategy. II - The main types of vulnerabilities in mobile applications Before listing the main vulnerabilities observed in mobile applications, it is important to remember that there are two categories of vulnerabilities in mobile applications.

2024-01-26T15:25:18+01:00September 14, 2021|Digital|0 comment

How do you secure your mobile application data?

How do you secure your mobile application data? In the age of hyper-connectivity, the issue of data protection is a constant in cybersecurity. There is no shortage of examples of massive hacking, as in May 2020 when a smartphone caller ID app reported a security breach. The personal data of over 47.5 million users was then exposed to theft. Today, the security of application data must be maintained throughout the entire Application Development Life Cycle (ADLC), long after the application has been downloaded by the end user. Rest assured: there are many ways to effectively improve data security on a mobile application, without compromising the user experience. Best practice no. 1 for securing data on your mobile application: analyze risks upstream An application's areas of vulnerability vary according to its architecture and functionality. It is therefore essential to carry out a preliminary risk analysis before launching a development project. To do this, make sure you know all the features of your future application: do you want to integrate a payment module? An identification system? Do you have a [...]

2024-04-17T10:30:41+02:00July 8, 2021|Digital|0 comment

Cybersecurity: 3 types of cyberattacks your company is exposed to

Cyber attacks are no longer epiphenomena: 4 out of 5 companies claim to have already been victims of cyber attacks. One might also think that cybersecurity issues only concern very large companies. That's not true: in 2019, the average size of organizations victimized by ransomware was 645 employees. Regardless of the size of your organization, cybersecurity is a topic to be taken very seriously as crime is increasing and the consequences of attacks can be catastrophic. "The banking industry is the most exposed sector to cyberattacks: +238% of attacks worldwide since the start of the pandemic between February and April 2020." Source: research firm VMware Carbon Black There are many types of cyberattacks in business. Some are well known, others are more confidential and therefore more devious. Here are the main ones in this article. Malware: Public Enemy No. 1 Malware is by far the most common cyberattack within organizations. In 2020, the cybersecurity company AV Test GmbH counted more than one billion pieces of malware worldwide: The most frequent types of malware in [...]

2024-01-10T09:52:37+01:00May 27, 2021|Data|0 comment

Health data and RGPD - where do we stand?

After having received a lot of criticism, the RGPD has been installed in all companies and administrations. From now on, the processing of data (personal or sensitive) is governed by new rules. However, the success of the RGPD is not just based on free consent or controlled cookies, but on the whole system of hosting and processing data. What about the security of our data? Has health data experienced a greater risk with COVID-19? 2 years later, it's time to take stock. RGPD and data governance According to the recent European Commission Report, companies "are developing a culture of compliance and are increasingly promoting the high level of data protection they provide as a competitive advantage." Both the European Commission and the CNIL are pleased with the success of the GDPR. With a 79% increase in complaints in 5 years, the least we can say is that citizens are informed. The CNIL has given itself several missions for 2020. Firstly, to reinforce its support for companies to implement compliance of their practices with, for example, a guide for developers. This year, [...]

2024-01-10T09:22:48+01:006August2020|Data, Digital|0 comment
Go to top