top of page
LEARN & UNDERSTAND
THE CYBERSECURITY AND GDPR COMPLIANCE BLOG
Our blog posts are all written by cybersecurity and/or GDPR compliance experts, depending on the area of expertise covered. Whether you are a novice, beginner, experienced or expert in the field : this blog is for you !
Discover here our expert advice : Cloud, IT, infrastructure, security governance, GDPR compliance, find here all the answers to your questions !
And if there is a subject you would like us to address, let us know !
Search


GDPR and image rights
Quelles sont les règles à respecter pour assurer une utilisation légale de l'image d'autrui.
Magali Perez
Aug 29, 20245 min read
14


How can you ensure that the data processing carried out by your organisation complies with the GDPR?
How can you ensure that the data processing carried out by your organisation complies with the GDPR regulation?

Era Selmani
May 21, 20247 min read
13


Software publishers: what procedure should you follow to report a vulnerability (CVE)?
Are you a software publisher who would like to know how to report a CVE? Find out more in our blog post!

Chloé Caraguel
Apr 17, 20245 min read
88


GDPR compliance and categories of personal data
Some data processing operations, due to their particularly sensitive nature, are strictly prohibited. Which one are they ?

Era Selmani
Mar 19, 20245 min read
57


GDPR and B2C and B2B commercial prospecting: what you can (and cannot) do.
What are the rules in terms of B2B and B2C commercial prospecting? What can you do to comply with the GDPR?

CyberSecura
Feb 19, 20246 min read
72


Using the Deming wheel for ISO 27001 certification: Do and Check phases
The Deming wheel applied to the construction of its ISMS in the context of ISO 27001 certification: the Do and Check phases.

Chloé Caraguel
Jan 17, 20245 min read
85


The CISO's role in IT security
Why is the role of CISO so essential? Why does a CISO need to be an expert in cyber security?

CyberSecura
Jan 17, 20245 min read
14


PROJECT: how to get an authorisation for a video-protection system
Do you want to install video protection equipment and systems? You need authorisation!

Chloé Caraguel
Nov 14, 20234 min read
10


7 actions to ensure your website is GDPR compliant
What do you need to pay attention to to ensure that your website is GDPR compliant? What are your obligations?

CyberSecura
Nov 14, 20236 min read
24


Using the Deming wheel for ISO 27001 certification: Plan phase (1/4)
How can the Deming Wheel tool be used to create an ISMS and for ISO 27001 certification?

Chloé Caraguel
Nov 3, 20237 min read
190


These GDPR compliance offers that should alert you
While there are a multitude of services on offer, not all of them are created equal. How do you choose between two RGPD compliance services?

CyberSecura
Oct 23, 20235 min read
22


PROJECT: drafting a Business Continuity Plan for a FinTech start-up
Find out more about our Business Continuity Plan drafting services, through this project with a Fin-Tech start-up.

CyberSecura
Oct 18, 20233 min read
78


How do you choose your cybersecurity service provider?
How do you choose your cyber security provider? What factors should you take into account and what aspects should you be vigilant about?

CyberSecura
Oct 17, 20235 min read
12


6 good reasons to call on an outsourced DPO
What are the benefits of using the services of an outsourced DPO, rather than entrusting GDPR compliance to an employee?

CyberSecura
Oct 9, 20236 min read
29


GDPR: Conditions applicable to consent and its exceptions
Consent is one of the six legal bases provided by the GDPR. But when is it necessary? And what are the exceptions?

Consultant CyberSecura
Oct 3, 20238 min read
617


Register of personal data processing: what does the CNIL say?
What is a data processing register, and why is this documentation essential for GDPR compliance?

David Rozier
Sep 13, 20235 min read
35


PROJECT: Regulatory compliance support for MARTI, a connected healthcare solution
MARTI is a medical application designed to improve care for allophone patients in emergency situations.

CyberSecura
Sep 8, 20233 min read
18


ISO 27001 certification: requirements and certification process
ISO 27001 certification: what are the requirements and what are the stages in the certification process?

Chloé Caraguel
Aug 7, 20237 min read
29


Phishing or Spear Phishing: what is the difference?
Phishing is an attack technique that is fairly well known to the general public. But do you know what's so special about spear phishing?

CyberSecura
Jul 17, 20233 min read
31


Legality of personal data processing: the different legal bases
What are the different legal bases justifying the lawful processing of personal data?

Consultant CyberSecura
Jul 17, 20235 min read
69
bottom of page