Insights

Insights

Cyber Incident Reporting around the World, Part 1.

“If you can’t measure it, you can’t manage it.” Peter Drucker Due to their scale, cyberattacks have impacted businesses, critical infrastructures and societies. Though the number of reported incidents has grown in the past few years, it is impossible to know how many cyberattacks there really are. A significant proportion of…
Insights

Disposable identities, what are they?

The classical tools and theories of the international political economy and diplomacy were the product of and well suited for the analogue world, where old strategies built on resource scarcity and ‘real’ events with physical objects apply. As transportation was experiencing revolution with cars, roads and highways, becoming mainstream, it…
Insights

IoTAC Software Security Evaluation Framework

Quantitative Security Assessment based on Static Analysis Software security was traditionally treated as an afterthought in the overall development cycle of software products, being introduced after the software product was implemented (or even used) mainly through the inclusion of external protection mechanisms (e.g., intrusion detection and prevention techniques). According to…
Insights

IAM at the heart of the zero trust approach

The rapid rise of cyberattacks of all kinds, particularly ransomware, is pushing companies to expand their defense perimeter by applying a zero-trust approach. But how does it work? And more importantly, how can its effectiveness be calibrated? Often, an organization’s first instinct is to implement zero trust at the network…
Yann Morvan
July 15, 2022