Cyber security

12 Results / Page 1 of 2

Background

today10/03/2023

  • 2151
  • 2
close

Cyber security + Cybercrime Nucleon Security

What are the strategic cybersecurity challenges of sovereignty

Cyber sovereignty, a strategic challenge Sovereign EDR is a strategic challenge in cybersecurity that concerns all economic and political actors. This name refers to a system of storage and processing of personal data that is fully managed and controlled independently. The objective is to preserve national sovereignty over sensitive data [...]

today08/02/2022

  • 1882
  • 2
close

Threat + Cyber security + Cybercrime + Ransomware Antoine Botte

Does your organisation need an EDR? 10 questions to ask yourself.

The offer of cybersecurity solutions and in particular endpoint protection is increasingly abundant. Each publisher offers new approaches according to its vision of actual trending threat. These solutions are then categorized by analyst firms such as Gartner, Forrester or KuppingerCole. It is increasingly difficult to judge the relevance of a [...]

today03/12/2020

  • 1517
  • 2
close

Cyber security + Ransomware + Threat Sébastien Guisnet

What are Machine Learning and Multi-Layer Zero-Trust and why use them in an EDR ?

Machine Learning and Multi-Layer Zero Trust, the winning combo for an efficient EDR. You’re maybe searching for your EDR (Endpoint Detection and Response). During the research of the perfect data and endpoints protection software, you may read a lot of scientific and abstract terms. In this article, we’ll uncover information ...

today07/08/2020

  • 4788
  • 5
close

Cyber security + Malware + CTI + Threat Nucleon Security

What is Threat Hunting and how it can benefit your organisation?

What is threat hunting and why we need it now ? Threat hunting designates all the activities conducted by a threat hunter or a cyberthreat analyst in order to find hidden persistent threats inside an organization’s infrastructure. Abnormal events such as a connection to an unknown server, access to a sensitive process memory or a DLL injection are some examples of what a ...

remediation and rollback your data after an attack

today11/06/2020

  • 1536
  • 3
close

Ransomware + Nucleon Security News + Cyber security Antoine Botte

Rollback and Remediation against Hakbit Ransomware

Ransomwares are still the most widespread cyberattacks targeting corporate data. That’s why in addition of the Multi-Layer Zero-Trust implementation in Nucleon Smart Endpoint EDR, we now release new post-exploitation features. In this article we will demonstrate our rollback and remediation features against Hakbit ransomware. The goal is to reduce the ...


Gain ground on cybercriminals


Start Free Trial Now

Background