top of page
LEARN & UNDERSTAND
THE CYBERSECURITY AND GDPR COMPLIANCE BLOG
Our blog posts are all written by cybersecurity and/or GDPR compliance experts, depending on the area of expertise covered. Whether you are a novice, beginner, experienced or expert in the field : this blog is for you !
Discover here our expert advice : Cloud, IT, infrastructure, security governance, GDPR compliance, find here all the answers to your questions !
And if there is a subject you would like us to address, let us know !
Search


ISO 27001 and the ISMS (Information Security Management System)
What is an ISMS and what is its role? What are the 4 ISO 27001 security criteria? And what are the prerequisites for certification?

Chloé Caraguel
Jun 27, 20235 min read
341


The GDPR and the principles relating to the processing of personal data
What are the principles for processing personal data?

Consultant CyberSecura
May 11, 20238 min read
44


Artificial intelligence: a help or a danger for cybersecurity?
Artificial intelligence: the definition Artificial intelligence (AI) is a set of techniques and methods that enable machines to learn,...

Consultant CyberSecura
Apr 13, 20238 min read
86


GDPR : who is concerned?
The GDPR: who is concerned? Where does the GDPR apply? And which data processing operations are affected by the regulation?

Consultant CyberSecura
Mar 15, 20235 min read
16


GDPR: purpose and objectives
Popularisation of Article 1 of Chapter 1 of the GDPR: "Purpose and objectives".

Consultant CyberSecura
Nov 28, 20226 min read
39


Darknet, dark web, clear web or deep web?
Some of these terms, often wrongly associated, refer in the collective mind to a part of the Internet reserved for criminals.

Consultant CyberSecura
Nov 2, 20225 min read
659


WPA/WPA2 cracking, PMKID, Evil Twin... Overview of attacks and threats to Wi-Fi in 2022
In this article, we will discuss the different attacks against Wi-Fi networks and the countermeasures to protect against them.

Consultant CyberSecura
Sep 16, 20227 min read
15,367


Pentest or white box audit ?
When we talk about "cybersecurity", we immediately think of pentesting. But is it really always the most appropriate audit?

CyberSecura
Jun 24, 20225 min read
417


Marketing, communication and cybersecurity issues
There is a common misconception that marketing and communications departments are immune to cyber attacks.

CyberSecura
Nov 5, 20218 min read
56


My journey in cybersecurity : courses, certifications and exams
Do you want to learn about cybersecurity but don't know what the prerequisites are or what studies to do?

Consultant CyberSecura
Sep 24, 20215 min read
66


Authentication : definition and methods
L'authentification est un élément crucial en cybersécurité : politiques de mots de passe, authentification biométrique.

Consultant CyberSecura
Aug 31, 20217 min read
489


The importance of cybersecurity monitoring
CNIL, ANSSI, CERT-FR, CESIN, etc. : découvrez les principaux acteurs à suivre pour une veille efficace en cybersécurité.

Consultant CyberSecura
Jul 21, 20214 min read
30


Cybersecurity and VSBs : 5 small changes that will make a big difference
If you are the manager of a VSE or SME trying to start securing your business at your own pace here are 5 tips that will make the difference

CyberSecura
Jun 23, 20218 min read
74


Social engineering and FOVI
Discover what social engineering is, how it occurs, learn how to recognise the signs of an attack and how to react.

Consultant CyberSecura
May 26, 20215 min read
46


PIA: Privacy Impact Assessment
Learn the theory and discover tips for daily practice.

David Rozier
May 12, 20216 min read
163


Long-term support VS. short-term service
What is the interest and what are the challenges of fully integrating cybersecurity into one's activity ?

CyberSecura
Apr 21, 20217 min read
10


Injection NoSQL
What is NoSQL injection ? Why is it dangerous ? And how to defeat a NoSQL injection ? A blogpost written by an expert.

Consultant CyberSecura
Apr 1, 20214 min read
216


What is the Bug Bounty?
What is Bug Bounty ? What is the difference between Bug Bounty and cybersecurity audits ?

CyberSecura
Mar 15, 20214 min read
9


Personal data breaches: cybersecurity and the GDPR
It is common to read statements equating GDPR and cybersecurity. As the GDPR is a regulation involving many issues beyond data security alon

David Rozier
Mar 1, 20215 min read
52


Employees in the corporate security chain.
What if it was time for companies to reintegrate the human factor into their cybersecurity policy ?

CyberSecura
Feb 15, 20215 min read
134
bottom of page