Incident Response Hotline
Orange logo Orange logo
  • Services
    • Assess & Advise
    • Design & implement
    • Detect & respond
    • Operate & support
    • Awareness & Training
  • Solutions
    • Secure infrastructure
    • Endpoint security
    • Data-centric security
    • Identity & access management
    • Security intelligence
    • Cloud security
    • OT/IoT
    • Ethical hacking
  • Insights
    • Blog
    • White papers & reports
    • Events
    • Datasheets
    • News
    • Videos
    • Case Studies
    • Epidemiology Labs
  • Market recognition
  • Contact
  • Services
    • Assess & Advise
    • Design & implement
    • Detect & respond
    • Operate & support
    • Awareness & Training
  • Solutions
    • Secure infrastructure
    • Endpoint security
    • Data-centric security
    • Identity & access management
    • Security intelligence
    • Cloud security
    • OT/IoT
    • Ethical hacking
  • Insights
    • Blog
    • White papers & reports
    • Events
    • Datasheets
    • News
    • Videos
    • Case Studies
    • Epidemiology Labs
  • Market recognition
  • Contact
Incident Response Hotline
04 Dec. 2020

Managed Detection & Response

Cyber-crisis: what should you do after?

Advices from Simon Deterre, security consultant.
03 Dec. 2020

Managed Detection & Response

How to deal with a cyber-crisis?

How to best react in the event of a large-scale cyber-attack.
02 Dec. 2020

Managed Detection & Response

Crisis management: how to prepare for a cyberattack?

Cyberattacks are still too often equated with IT crises only. However they impact all services, the reputation and image of any structure
27 Nov. 2020

Cloud

Public cloud or companies: who is responsible for security?

Next year, the global public cloud market will exceed $380 billion. Who, the cloud services provider or the client company, is responsible for security?
25 Nov. 2020

Cloud

Pentesting a cloud environment

Configuration errors are the primary source of risk of intrusion into cloud environments. Discovery of pentest on the cloud.
23 Nov. 2020

Cloud

Cloud: detecting and responding to threats

As a source of flexibility and cost reduction, the cloud is widely adopted by businesses around the world. To identify and counter cyberattacks linked to the cloud, cybersecurity providers are therefore evolving their processes and technologies.
1 2 3 4 … 98
  • General Terms and Conditions
  • Disclaimer
  • Privacy Policy
  • Cookie Policy