In this section you will find news from our partners and companies active in the IT security market.
Should we migrate to the cloud? And how? This is the number one priority for Belgian ICT decision-makers, but in the meantime, cyber-security remains a major concern, as does data processing.
Source : datanews
Loss (literally) of dexterity when using computers or applications, deterioration of cognitive abilities, influence of age or illness on visual acuity..., the use of digital applications and devices can be or become problematic for some people.
Source : Regional-IT
With the May 25 deadline now behind us, most companies are congratulating themselves on the efforts made and the results achieved. All customers have been informed. The number of legal actions remains limited. And consumers are satisfied. However, there is one thing that should worry us even more, and which we have so far completely ignored: it's not our privacy that's under threat, but rather our spontaneity.
Source : Regional-IT
The DPO, for «Data Protection Officer», is a person in charge of protecting the personal data processed by an organization (administration, company...). This is a new profession created by the RGPD 2018, the European Data Protection Regulation, which comes into force on May 25, 2018. This text makes its appointment mandatory for a large number of personal data processors.
Source : Law-Finance
According to Fortinet, the vast majority of companies are compromised by vulnerabilities that have been known about for several years.
Artificial intelligence (AI) is a technology that scares as much as it fascinates. Although the opportunities are immense in many respects, opinions remain divided within the international «Tech» community, with Elon Musk warning of the «major risk that AI represents for our civilization».
Source : Linkedin
According to Fortinet, the vast majority of companies are compromised by vulnerabilities that have been known about for several years.
The figures speak for themselves: in 90% of cases, victims were attacked through flaws that were more than three years old, and in 60% of cases, these flaws were ten years old or more. The WannaCry attack used the EternalBlue flaw in Windows, which was one of the NSA's tools for spying on its targets. This flaw had been made public by hackers from The Shadow Brockers group.
Source : solutions-magazine
As you all probably know, EASI already offers you a solution to backup your Virtual Machines into our cloud. But what about your user endpoints? What if one of your employee's laptop gets stolen? What if a cryptovirus infects the endpoint?
Source : Safe2be
EBRC, backed by Guidance Software's world-renowned technology and expertise, presents a new service in the field of cybersecurity, and more specifically in DFIR (Digital Forensic Incident Response)...
Source : IT Nation
Wanna Cry and Petya drove home the damage ransomware can do to organizations. RaaS kits available on the Dark Web allow the least technically savvy among us to launch more of the same.
Source : Sophos
Many global business decision makers are unaware of the implications of the forthcoming General Data Protection Regulation (GDPR), as well as other compliance regulations like PCI-DSS and ISO27001/2, with one in five admitting they don't know which regulations their organization is subject to.
Source : Storage Newsletter
Microsoft launches Security Risk Detection, an AI-enhanced bug-finding tool to help developers reduce the number of vulnerabilities in their software.
Source : Silicon FR
Saretec, an insurance expertise company, develops Machine Learning algorithms to automate entire areas of its business.
Source : Silicon FR
Saretec, an insurance expertise company, develops Machine Learning algorithms to automate entire areas of its business.
Source : Silicon FR
The RGPD (General Data Protection Regulation), which comes into force on May 25, 2018, will not only have an impact on all member countries of the European Union, but also on countries that process data concerning EU citizens.
Source : Key Communications
One in three former employees may still have access to the network
Access to the corporate network... Limited trust: only 41% of security professionals fully trust employees...
Source : Solutions Magazine
Secure by Design‘ is becoming a basic criterion, no longer an option. Application Security Testing is therefore becoming essential,’ explains Patricia Cordonnier, Security Solution Sales, Sogeti.
Source : Solutions Magazine
In October, a new data center, named BelgiumDC, should be operational in the Liège region. The brainchild of a joint initiative between NRB and Etix Everywhere, a Luxembourg-based company specializing in the construction and management of data centers, it will accommodate both customers with dedicated server space and those who prefer colocation.
Source : Regional-IT
The major media have recently denounced the numerous computer attacks involving ransomware (“ransomware”) operated by dishonest computer hobbyists exploiting a flaw in certain versions of the Windows operating system to enrich themselves through the payment of a sum in “Bitcoins”....
Source : Régional-IT Wallonia-Brussels