Infrastructure

Businesses, protect yourself on cloud

70% of the world's enterprises are clients, the preferred investment area for large organizations, exponential growth... In 2019, the success of cloud is no longer in question. Is this popularity flourishing without risk? Not so sure. Last January, the company Dimensional Research released a vast study mixing risk management and cloud . The results show that public clouds are too weak when it comes to security. The risks are therefore not insignificant. Let's take a look at the problems raised by this solution and decipher the study. Profile of the American participant The IT manager works in a company with between 1000 and 5000 employees. Most of them work in a public cloud environment. A total of 337 international professionals took part in the question and answer session proposed by Dimensional Research. The cloud public is risky The problems created by the cloud public are placed in a chain. Since each key to the process is flawed, the outcome is tainted. Phase 1, service selection, can be dangerous. 85% of enterprises run in non-compliant public clouds. However, there is no need to worry too much, as the majority of them are using networks that are 75% or more compliant. Phase 2, the risks [...]

2024-01-10T14:42:00+01:00April 18, 2019|Risk management|0 comment

Edge computing and cybersecurity: beware of risks

On September 24, at the Microsoft Ignite conference, cybersecurity was in the spotlight! The company announced the pre-launch of a new tool: Azure Data Box Edge. Dedicated to connected objects, Microsoft's tool is a mini Data Center focused on edge computing. What is the interest of this solution? Since the emergence of connected objects, the collection and processing of data in complete security are more central than ever. From Cloud computing, companies have moved to Edge computing. What does this change mean? What are the consequences in terms of cybersecurity? Edge computing in the age of IoT What is edge computing? In a nutshell, it is an open distributed computing architecture. Data is not gathered and processed in one place. It is processed at the edge of the network, hence the term "edge". The goal is to process the data close to where it is produced. According to Cisco or Helder Antunes, it is impossible today to guarantee that the large amount of new data will be sent and processed in a fast or stable way to data centers. However, in certain industries, such as healthcare, telecommunications or finance, data must be processed quickly, even in real time. IT architects have therefore thought of a mesh network of micro Data Centers placed near the connected objects that would process the data as quickly as possible. [...]

2024-01-10T08:18:21+01:00October24,2018|Data, Digital, Risk management|0 comment

Risk Management: Cybersecurity must be at the heart of the global strategy

According to AMRAE (association du management des risques et assurances de l'entreprise), cybersecurity-related risks moved up from 7th place to the top 3 of risk managers' main concerns in 2017. This is hardly surprising: in recent years, the production, use and storage of data have become strategic topics for companies. With the digital transformation of companies, the issue of data security now affects all business lines, further multiplying the associated risks. In addition, regulatory pressure is forcing organizations to structure data protection, as was the case in May 2018 with the implementation of the RGPD. Also read: our article on the RGPD and sensitive data. Another growing phenomenon: cyberattacks, which are becoming increasingly frequent and taking on new forms, are using new vectors, to hack, destroy or kidnap data. With phenomenal speed of propagation, as we saw in 2017. Remember "WannaCry": this attack alone claimed 200,000 victims in 2 days, including the British healthcare system, Telefonica in Spain and Renault in [...]

2024-01-10T08:16:35+01:00July26, 2018|Data, Risk management|0 comment
Go to top