Cybersécurité

11 Results / Page 1 of 2

Background

aujourd'hui10/01/2023

  • 1200
  • 2
fermer

Cybersécurité + Cybercrime + Ransomware Amine Aouka

Qu'est-ce que le Zero-Trust multicouche et comment il peut aider votre organisation

Zero Trust: What is it? Zero Trust is an approach to security that involves implementing multiple layers of controls and security policies to ensure that only authorized users and devices have access to a given resource. It is based on the “never trust, always verify” principle, which means that any [...]

aujourd'hui20/09/2022

  • 1124
  • 3
fermer

Cybersécurité + Cybercrime + Ransomware Amine Aouka

Nucleon Security présenté comme l'une des meilleures solutions EDR

Recently, Nucleon Security was featured as one of the best endpoint protection solution providers! For that, we want to thank  Cybernews Team - an online resource packed with breaking news, product reviews, exclusive interviews, and tips. You can check the endpoint protection top picks here or the best VPN for [...]

aujourd'hui08/02/2022

  • 1157
  • 2
fermer

Cybersécurité + Cybercrime + Ransomware + Threat Antoine Botte

Avez-vous besoin d’un EDR ? les 10 question à se poser.

The offer of cybersecurity solutions and in particular endpoint protection is increasingly abundant. Each publisher offers new approaches according to its vision of actual trending threat. These solutions are then categorized by analyst firms such as Gartner, Forrester or KuppingerCole. It is increasingly difficult to judge the relevance of a [...]

aujourd'hui03/12/2020

  • 1125
  • 2
fermer

Cybersécurité + Ransomware + Threat Sébastien Guisnet

Qu’est-ce que le Machine Learning et le Multi-Layer Zero-Trust et pourquoi les utiliser dans un EDR ?

Machine Learning and Multi-Layer Zero Trust, the winning combo for an efficient EDR. You’re maybe searching for your EDR (Endpoint Detection and Response). During the research of the perfect data and endpoints protection software, you may read a lot of scientific and abstract terms. In this article, we’ll uncover information ...

aujourd'hui07/08/2020

  • 4183
  • 4
Featuredstar
fermer

Cybersécurité + Malware + CTI + Threat Sébastien Guisnet

What is Threat Hunting and how it can benefit your organisation?

What is threat hunting and why we need it now ? Threat hunting designates all the activities conducted by a threat hunter or a cyberthreat analyst in order to find hidden persistent threats inside an organization’s infrastructure. Abnormal events such as a connection to an unknown server, access to a sensitive process memory or a DLL injection are some examples of what a ...

remediation and rollback your data after an attack

aujourd'hui11/06/2020

  • 1201
  • 3
fermer

Cybersécurité + Ransomware + Nucleon Security News Antoine Botte

Rollback and Remediation against Hakbit Ransomware

Ransomwares are still the most widespread cyberattacks targeting corporate data. That’s why in addition of the Multi-Layer Zero-Trust implementation in Nucleon Smart Endpoint EDR, we now release new post-exploitation features. In this article we will demonstrate our rollback and remediation features against Hakbit ransomware. The goal is to reduce the ...

aujourd'hui27/03/2020

  • 2081
  • 1
fermer

Cybersécurité + Ransomware Sébastien Guisnet

Living Off the Land or Filleless Attacks

What are Living off the land or Filleless attacks and why is it a real Cybersecurity issue? The different appellations  Targeted and non-targeted cyberattacks use different operating methods to achieve their ends. Among these operating modes we find attacks without files. These can have several names: fileless attacks zero-footprint attacks non-malware attacks [...]

Gagnez du terrain sur la menace


Essayez gratuitement

Background