Adopted by the French government in 2013, the Military Programming Law (or LPM) requires certain economic and public operators to safeguard their IT systems of “vital importance”.
All rights reserved: Les Echos – Anaëlle Grondin /Worldcrunch
2017 will see the rise of ransomware attacks on mobile and connected devices, cyber security experts have warned. Continue reading
When it comes to Big Data, some see it as the beginning of a new world. But others are frightened of what it represents; namely, a gigantic volume of data. If one thing is sure, it’s that Big Data is at the heart of some of our biggest concerns today. Our ecosystem, brimming with personal information systems (smartphones, tablets, etc.) and connected objects, is sending the volume of available data into exponential growth, to the point where human intelligence alone simply isn’t enough to process it anymore.
New connected service offers aside, digitalisation is pushing Property and Liability insurance companies to take up their position in the new emerging ecosystem to become key players. But which pathways will lead them there? Continue reading
Here I outline the four main elements in the “transformational team” equation: agility, innovation, curiosity, and pleasure. This is a new way of working, with a team often comprised of original and iconoclastic IT profiles. In this article, I offer a few examples of the profile types which could be used to build a new transformational team. Continue reading
When it comes to security, digital transformation brings about new demands and new risks. To enable users to adopt these new services in total confidence whilst fully understanding the data risks for the company, a global approach should be put into place. Here I set out the 5 golden rules that I would recommend to new IT Security Managers (ITSM). Continue reading
Copyright – Die Welt/Worldcrunch – Anna-Sophie Sieben
Important documents often exist only in digital format. But even storage devices have expiration dates. To safeguard personal data and avoid losing it, you should follow some basic rules.
Copyright -The Washington Post/Worldcrunch- Karen Turner
“In sum: Alexa is kinda my new best friend,” writes Rebecca Hanover, an author and blogger on Mommyproof. As a mother of young children, it’s not hard to see why: Hanover details the joys of virtual assistant Amazon Echo, which functions as a kind of combined kitchen helper, child entertainer and DJ. “Is it weird that Alexa feels like my trusty little friend during that six pm witching hour, gently guiding me through dinnertime?” Continue reading
Copyright – Les Echos – Fabien Rech
Hackers have started sending fraudulent emails using QR code technology, masquerading as a national communications provider to get client usernames and passwords.
It is a first in the history of hacking. Vade Retro, a company that specializes in mailbox protection, recently announced it had detected the first use of fraudulent emails using QR codes — two-dimensional barcodes used to store digital information that can be deciphered by a smartphone. Continue reading
Copyright – Les Echos – Fabien Rech
Would you give your house keys to a complete stranger when you are on vacation? Probably not. Human instincts opt for a safer solution.
The question of security is the major constraint preventing more widespread adoption of cloud computing technology. A study by Crowd Research Partners revealed that nine out of 10 professionals worry about safety and security. Data breaches remain the biggest concern for businesses that deploy private cloud servers, software cloud servers (Software as a Service, SaaS), or infrastructure cloud products (Infrastructure as a Service, IaaS). Continue reading