
Risk_Insight
@Risk_Insight
Followers
4K
Following
2K
Media
967
Statuses
5K
#Wavestone consultants' #Cybersecurity & #Digital #Trust blog. Sharing thoughts on #risk #governance #digital #identity #digital #awareness news
Paris
Joined April 2009
While the EU has chosen the legislative path with the AI Act to reconcile #innovation and fight against the #misuse of #AI, the UK and the US have each chosen a different approach to do that. Discover them with our experts in our latest article.
riskinsight-wavestone.com
Today, as governments actively craft AI guidance and legislation, policymakers face the challenge of delicately balancing the need to foster innovation and ensuring accountability. A regulatory...
0
0
0
How to secure #smart #grids?. That's why the #IEC #62351 norm was created, to help secure the IT network of smart grids. Discover with us this standard and its added value, to assess whether it is appropriate to seek compliance with it.
riskinsight-wavestone.com
IEC 62351 is an international cybersecurity standard for Smart Grid communication and control systems. Its aim is to help grid operators protect themselves against threats endangering this sector,...
0
1
1
Can #AI revolutionize #IAM? 💡. Our experts examine this question by exploring several use cases around AI and IAM, to identify the #added #value of current and forthcoming solutions, and the remaining #challenges for AI integration in IAM systems. 🔍.
riskinsight-wavestone.com
But can the AI advances be applied to IAM? Can we delegate the management of our identities and accesses in whole or in part, when the protection of user data has become a major concern?
0
0
0
How to deal with #AI-related cyber threats?. As #AI is being increasingly used within companies, come discover the insights of our experts on what new #threats this technology brings, and what measures you can take to use it in a safe and #trustworthy way.
riskinsight-wavestone.com
The use of artificial intelligence systems and Large Language Models (LLMs) has exploded since 2023. Businesses, cybercriminals and individuals alike are beginning to use them regularly. However,...
0
0
0
The #SBOM, a vital ally for the #security of your products?. Our experts show you how #SBOM can be used to improve your software security, what challenges still need to be overcome to exploit it fully, and what the outlooks are for SBOM in the future.
riskinsight-wavestone.com
Since its initial appearance in 2014 and following its formalization in 2021 under the auspices of the Biden administration, the concept of SBOM (Software Bill of Materials) continues to captivate...
0
0
0
Are #industrial #PLC networks incompatible with future cybersecurity challenges?. With #industrie4.0, industrial systems are increasingly interconnected. Our experts analyze the impacts of these transformations on the historical #PLC network model.
riskinsight-wavestone.com
Introduction Industrial systems are a category of information systems of their own, with codes and properties that differ from “classic” IT systems. It is well known that the level of maturity of the...
0
0
0
#Deceptive #Security, or how to trick attackers #2 🎩.After a first article on #decoy strategy conception, our experts present a use case of deceptive security on AWS #cloud. Come discover the added value of such a strategy for cloud security.
riskinsight-wavestone.com
Today, cyber-attacks are part of our daily lives, and are becoming increasingly common and sophisticated. Simultaneously, we are moving towards Information Systems that are built on an ever-incre...
0
0
1
Cloud Access Security Brokers (#CASB) are emerging as a key solution to secure #cloud usage. Our experts have analyzed Microsoft CASB, Microsoft Defender for Cloud Apps, to present you the benefits and challenges of CASB implementation. #cyber #SaaS.
riskinsight-wavestone.com
La migration des données et des espaces collaboratifs sur le cloud a donné naissance à de nouveaux canaux de fuite de données et a notablement étendu la surface d’attaque pour les entreprises. Par...
0
0
1
In factories, most programmable logic controllers are managed by a #SCADA. Its nature makes it critical. It's therefore necessary to secure their #software. But "conventional" solutions don't meet #industrial environment constrains. #cyber #OTsecurity.
riskinsight-wavestone.com
The industrial control system (ICS) is the set of resources and machines used to supervise and control an industrial process. This article looks at the security issues surrounding Windows devices of...
0
0
0
#Deceptive #security or how to trick attackers 🎩.The goal is to fool attackers into believing that #security defenses are different from what they are. Our experts answer all your questions, from the most conceptual to the most technical.
riskinsight-wavestone.com
Today, cyber-attacks are part of our daily lives, and are becoming increasingly numerous and sophisticated. Simultaneously, we are moving towards Information Systems built on an ever-increasing...
0
0
0
In industrial environments, #OT teams often find themselves on their own when it comes to meet cybersecurity requirements. Therefore "home-grown" solutions are often developed, unsupervised. Discover our #methodology to build a #cyber solutions catalog!.
riskinsight-wavestone.com
During the Wavestone OT Cyber Day, Loïc Lebain and Benoit Bouffard conducted a workshop in which they noted that IT departments were still struggling to develop a catalogue of cybersecurity solutions...
0
0
0
As the world gears up for the next #OlympicGames, it's crucial to fortify your digital defenses. Explore the new #cyber trends with our 2024 CISO #Radar:.☁ #Cloud migration.🔒 #ZeroTrust Model.🤖 #AI Powered Security.🌿 Sustainable Practices. And more!.
1
0
0
Did your #RedTeam consider a #cloud attack vector?. Public cloud misconfigurations can allow an attacker to bypass strong tiering isolation, up-to-date OSs and full EDR coverage. Discover some of the attack paths exploited by our pentesters:
github.com
Contribute to wavestone-cdt/jumping-from-cloud-to-on-premises-and-the-other-way-around development by creating an account on GitHub.
0
2
4
For organizations based in #China, #compliance with the #PIPL law on personal data transfer has led them to define the autonomy level of their Chinese entity. Depending on their #risk appetite, several #scenarios may be considered…. #cyber #decoupling.
riskinsight-wavestone.com
The PIPL (Personal Information Protection Law) has emerged as an unprecedented first example of highly protective regulation of personal data, establishing an uncertain framework that reinforces...
0
0
0
#Cyber sector struggles to #recruit and #retain talents. In this war for talents, how can you become more #attractive to both, candidates and those already in place?. Our experts share #lessons learned from #CISOs and Talent Managers. #HR #strategy.
riskinsight-wavestone.com
“Talent shortage”, “skills gap”, “employee burnout in cybersecurity”, “high turnover rate” – as a cybersecurity professional, you must be familiar with these expressions, for better or for worse.
0
0
0
5 minutes to understand PIPL, China's data protection law.Passed in 2021, China's #PIPL privacy law will soon see be updated for more #flexibility on data transfer. Our experts report on:.📅 The #context.🎯 The #compliance #strategies.🔦 #Tips to prepare.
riskinsight-wavestone.com
China may soon ease PIPL cross-border data transfer requirements, but your privacy compliance strategy should focus on the long term. Your company operates in China. You compile personal data...
0
0
0
Transitional time during M&A ops is often an opportunity for #cyberattacks. #Cyber #DueDiligence adds significant #value to teams and guides decision-making on various levels. Our experts tell you the secrets to make it successful!. #mergeandaquisition.
riskinsight-wavestone.com
Confidential and strategic, the due diligence phase that precedes an acquisition regularly takes place behind closed doors. This phase aims to analyse the target company for an acquisition, in order...
0
0
0
Artificial Intelligence: are you visionary, pragmatic, or skeptical?.Between #enthusiasm and #caution, generative #AIs evoke mixed feelings. Our experts have compiled the most frequently asked questions from our clients and provided answers. #AIgen #cyber.
0
0
0
The #CICD approach is an indispensable method for developing #app. Several #solutions in the #cloud exist to satisfy security and efficiency needs, notably on #AWS. Source code or flows management, IAM, AWS integrated solutions are reviewed by our experts.
riskinsight-wavestone.com
Integrating security directly into the configuration of CI/CD pipelines, especially through the practice of DevSecOps, enables the development of secure applications while increasing delivery...
0
0
1
Construction companies use #collaborative methods, in particular the #BIM method. #Altering datas required to create these models can have serious consequences, including threatening people's #life. Discover our risks scenarios and advices to secure BIM.
riskinsight-wavestone.com
On a daily basis, stakeholders within construction handle a variety of data that may be of interest to malicious parties. They are subjected to the same types of malware attacks as players in other...
0
1
0