Security Whitepapers

No kidnapping, no ransom

Ransomware is still one of the most lucrative weapons in a cybercriminal’s arsenal. This kind of cybercrime encrypts the files on a computer, and blocks access to them until the required ransom is received, generally in the form of bitcoin, an untraceable virtual cryptocurrency. The total cost of this Trojan in 2017 was around $5

CYBER-RESILIENCE: THE KEY TO BUSINESS SECURITY

A quick Google search of the term “resilient companies” turns up 44,400,000 results in less than a second. This concept, defined as “the capacity to recover quickly from difficulties and come out stronger”, has become key to businesses that face a large number of risks born from the context of a global economy: from cyberattacks

Vulnerability Management

Security gaps on smartphones and tablets that are now found in almost all large networks must be detected in order to quickly introduce countermeasures. For mobile devices, this kind of scan is at least as important as on PC clients, as consumer-oriented mobile devices generally do not provide for an administrator role which could enable

Enterprise Mobility Management

There isn’t one EMM solution that is the right choice for all companies. It is important to define the functional scope precisely and test suitable solutions. In addition to the functionalities offered, the type of operation and handling of the solution also play a crucial role. And it’s not just about the technology – the

Cyber Defender Strategies: What Your Vulnerability Assessment Practices Reveal

In this report, we analyze real-world end-user vulnerability assessment (VA) behaviour using a machine learning (ML) algorithm to identify four distinct strategies, or “styles.” These are based on five VA key performance indicators (KPIs) which correlate to VA maturity characteristics. This study specifically focuses on key performance indicators associated with the Discover and Assess stages