Why Security Questionnaires Aren’t the Best for Risk | CSA
Discover why traditional security questionnaires fail to provide accurate risk assessments and how companies can implement more effective evaluation methods.
[FIC 2025] Déclin de la confiance dans les services numériques, sauf dans les secteurs public et bancaire
La confiance dans les services numériques est en déclin. Sur 13 secteurs de l'économie, seules les organisations gouvernementales, la banque et...-Cybersécurité
Cisco warns of CSLU backdoor admin account used in attacks
Cisco warns admins to patch a critical Cisco Smart Licensing Utility (CSLU) vulnerability, which exposes a built-in backdoor admin account now used in attacks.
[FIC 2025] La sécurité "by design", essentielle pour protéger les systèmes d'IA des cyberattaques
A l'occasion du Forum InCyber, le Campus Cyber, en collaboration avec le Hub France IA, publie un guide pour protéger les systèmes...-Intelligence artificielle
North Korea's Fake IT Worker Scheme Sets Sights on Europe
Google has found a significant increase in North Korean actors attempting to gain employment as IT workers in European companies, leading to data theft and extortion
MFT and AI: Secure Data Movement for AI Success | CSA
The challenges many enterprises face in harnessing AI’s potential are becoming more apparent. MFT plays a crucial role in enabling enterprises to leverage AI.
Rational Astrologies and Security - Schneier on Security
John Kelsey and I wrote a short paper for the Rossfest Festschrift: “Rational Astrologies and Security“: There is another non-security way that designers can spend their security budget: on making their own lives easier. Many of these fall into the category of what has been called rational astrology. First identified by Randy Steve Waldman [Wal12], the term refers to something people treat as though it works, generally for social or institutional reasons, even when there’s little evidence that it works—and sometimes despite substantial evidence that it does not...
SHARED INTEL Q&A: Forrester’s Geoff Cairns on why IAM is overdue for a fundamental reset
Identity and Access Management (IAM) is no longer just about keeping the wrong people out—it’s about ensuring the right people, machines, and AI-driven agents can securely operate in an increasingly complex digital world. Related: How IAM can be a growth engine If 2024 was the year of Zero Trust acceleration, 2025 is shaping up to
Cybersécurité : quand les petits détails font les grandes failles
Les grandes affaires de fuites de données secouent l'actualité, mais qu'en est-il du quotidien de la sécurité informatique dans les entreprises...-Cybersécurité