Govware Singapore 2017, September 19 – 21

Discover Bizsecure  Cyber Security Solutions at Booth N24 Hear our cyber security consultants out on how to defense and guard against malicious attacks without compromising business continuity. Our Key Products will be featured with LIVE DEMO, to exhibits on preventing internal and external cyber threats, providing flexibility in securing cloud and on premise data assets. Product Highlights   STORMSHIELD (By Airbus Defense & Space) Military Grade…

WannaCry, or go back to the future

Our connected world is experiencing a major new crisis since the sensational arrival of WannaCry ransomware, a.k.a WannaCrypt, WanaCrypt0r or WCry. We had grown accustomed to living with the threat of infamous ransomware for several months. Many organizations had managed to slip under the radar, while others had taken preventive measures by raising user awareness or by deploying next-generation technologies.…

STORMSHIELD JOINS DROPBOX PARTNER NETWORK

Stormshield, the cloud-optimized encryption solution, announced today that it has joined the Dropbox Partner Network which enables customers to benefit from selected and proven technology solutions. Through a deep roster of leading security integrations, the Dropbox Partner Network enables greater visibility, interoperability, and control over how company information is accessed and shared. Paris, 03/05/2017 – Today, the French IT security…

Impact of General Data Protection Regulation (GDPR) on application design and security strategies

With less than 12 months before the General Data Protection Regulation (GDPR) is enforced, the clock is well and truly ticking. With today’s complex IT environments and cloud deployments, having everything in place on time is a real challenge.  Especially to avoid a fine that can be up to 20M€ or 4% of global revenues. Surprisingly (or not), it has…

PAM as a State of the Art Security Tool

Why PAM Is the State of the Art Security Tool The benefits of a well-implemented SIEM or IDS solution are clearly understood. The path to doing even better with them, however, depends on how efficiently the cybersecurity team can manage their output. SIEM and IDS tend to produce false positives or ambiguous findings that require follow up investigation. This is…

GDPR and Privileged Access Management (PAM): What International Businesses Need to Know

In fact, the GDPR applies to any business that deals with private EU resident data, regardless of whether they are based in the EU. For example, a US company with a subsidiary in the EU (or just doing business with EU citizens) would be bound by the rules. In other words, GDPR impacts virtually every company of any size everywhere…

PAM and Database Security

Structured data is at the heart of virtually every company’s most valuable IT assets. Database security is therefore critical. In this article, we look at how a privileged access management (PAM) solution can improve your existing database security. The users who represent the deepest threat to your database are also the people in whom you place the most trust: the…

Wikileaks, Twitter hacks : 6 best practices to avoid data theft

Wikileaks revealing that the CIA turns our connected objects into spying tools, Twitter accounts getting hacked... Do you know how to protect your data ? The American intelligence agency would have elaborated several thousands malicious programs: virus, Trojan, malware… to take control and spy on us through our smartphones, connected televisions and even through our cars. We discover in those revelations that…

Denyall products refresh focuses on automation

DenyAll announces a refresh of its entire product line. New features address the needs of DevOps teams by simplifying and automating tasks associated with testing and protecting web applications, web services and APIs. Continuous integration and delivery is the name of the game for any business looking at digital transformation as a competitive differentiation opportunity and breaking organizational silos to…

IT Security Productivity

Few people want to talk about the nitty-gritty of IT Security productivity, but the reality is that companies are spending ever-increasing amounts on IT security so productivity is a topic that isn’t going away. Time is Money Like it or not, every task that requires an employee’s time comes at a price. If a person is paid $300 per day…