RESTER INFORMÉ

Découvrez nos derniers articles et notre vision du secteur de la cybersécurité.

2023 Predictions

2022 Review Ransomware business is still growing check out the FIN7 groups, which are becoming increasingly sophisticated - bit.ly/Prodaft-FIN7 If you don't know Prodaft, let us talk. It is a critical threat intelligence app and service to add to your defensive arsenal See more 2022 stats...

Cost Optimization

Where to start? What to consider? The following are a few avenues that can be explored to optimize costs and, in most cases, reduce them. I called it smart security, as good thinking is required to achieve cost optimization. This post is an answer to a previous LinkedIn Post. Reduce incide...

Aftermath Of A Ransomware Attack

Detection, Prevention, Negotiation, And Recovering Your Information Assets Safely Malicious actors infiltrate information systems and networks having vulnerabilities, lurk in the dark, and attack when these vulnerabilities can be exploited the most. It may cause massive damage to organizational in...

Do SMEs need a CISO? How unprecedented growth in cyberattacks calls for appointing a CISO!

Cyberattacks continue to grow at an unprecedented rate, and SMEs (Small and Medium Enterprises) find themselves in a logjam of regular intrusion attempts and incidents. Given the limited resources and budgetary constraints, the most common question is, do SMEs need a CISO? With cyberattacks becomi...

Invest in data security now to avoid costly GDPR fines

Since the GDPR was adopted in 2018, there has been a significant increase in the size and quantity of data protection fines. Whilst the regulators have in 2020-21 been more lenient due to the financial hardship encountered by many businesses during the Coronavirus pandemic, we can expect the Data Pr...

How to Hire The Best Cloud Security Consultants For Your Organisation

Cloud security consultancy services provide organisations with tools, technologies, and guidance on policies so they can safeguard their cloud environment from various cybersecurity threats. This article discusses best practices to hire the most suitable cloud security consulting firm for an o...

Virtual Workforce and Workplace, and the role of a vCISO (Virtual CISO) in the Post-Pandemic World

Today, in the midst of a ravaging pandemic, business entities have been increasingly adopting virtual workplaces and virtual workforce solutions. Hence, enterprises globally are feeling a pressing need for hiring a virtual CISO (vCISO). Moreover, the focused efforts from a vCISO, his exp...

A guide to compare SIEM, SOAR, and XDR for SMES and SMBS from a complexity and cost perspective

When it comes to effective and efficient incident management for your business enterprise, you do not want to leave any stone unturned to keep your valuable information assets safe. This article gives you insight into the best solution for your enterprise- SIEM, SOAR, or XDR when dealing with incide...

Guy Marong's latest article published on Paperjam

Cubic Consulting in the press Discover Guy Marong's latest article published on Paperjam's website. "Cybersecurity, a strategic issue" (in French) Read the article

2023 Predictions

2022 Review Ransomware business is still growing check out the FIN7 groups, which are becoming increasingly sophisticated - bit.ly/Prodaft-FIN7 If you don't know Prodaft, let us talk. It is a critical threat intelligence app and service to add to your defensive arsenal See more 2022 stats...

Cost Optimization

Where to start? What to consider? The following are a few avenues that can be explored to optimize costs and, in most cases, reduce them. I called it smart security, as good thinking is required to achieve cost optimization. This post is an answer to a previous LinkedIn Post. Reduce incide...

Aftermath Of A Ransomware Attack

Detection, Prevention, Negotiation, And Recovering Your Information Assets Safely Malicious actors infiltrate information systems and networks having vulnerabilities, lurk in the dark, and attack when these vulnerabilities can be exploited the most. It may cause massive damage to organizational in...

Do SMEs need a CISO? How unprecedented growth in cyberattacks calls for appointing a CISO!

Cyberattacks continue to grow at an unprecedented rate, and SMEs (Small and Medium Enterprises) find themselves in a logjam of regular intrusion attempts and incidents. Given the limited resources and budgetary constraints, the most common question is, do SMEs need a CISO? With cyberattacks becomi...

Invest in data security now to avoid costly GDPR fines

Since the GDPR was adopted in 2018, there has been a significant increase in the size and quantity of data protection fines. Whilst the regulators have in 2020-21 been more lenient due to the financial hardship encountered by many businesses during the Coronavirus pandemic, we can expect the Data Pr...

How to Hire The Best Cloud Security Consultants For Your Organisation

Cloud security consultancy services provide organisations with tools, technologies, and guidance on policies so they can safeguard their cloud environment from various cybersecurity threats. This article discusses best practices to hire the most suitable cloud security consulting firm for an o...

Virtual Workforce and Workplace, and the role of a vCISO (Virtual CISO) in the Post-Pandemic World

Today, in the midst of a ravaging pandemic, business entities have been increasingly adopting virtual workplaces and virtual workforce solutions. Hence, enterprises globally are feeling a pressing need for hiring a virtual CISO (vCISO). Moreover, the focused efforts from a vCISO, his exp...

A guide to compare SIEM, SOAR, and XDR for SMES and SMBS from a complexity and cost perspective

When it comes to effective and efficient incident management for your business enterprise, you do not want to leave any stone unturned to keep your valuable information assets safe. This article gives you insight into the best solution for your enterprise- SIEM, SOAR, or XDR when dealing with incide...
FREE
2-hour FREE risk assessment