Answering to incidents

An incident is an event that prevents you to reach your objectives. Its causes are multiple : we have neglected to follow ‘our’ rules our rules are inadequate some rules lack in our set our risk management is insufficient. Whatever we…

State of Emergency … the strategies

One can hit your information by accident he won’t make much damage. Whatever the attacker’s profile (and you can imagine other profiles combining two or three of the basic ones) be sure no one act rashly and without preparation. No…

State of Emergency

When the situation requires it, we have to go along this line. But do we really know the enemy? There are 4 profiles of nasty or malevolent people. Recent history forces us to think about a fifth one. Let’s see…

CSI: Cyber… info or hoax?

I admit I make you sometimes uneasy (the word is frequently weak) and provide with solutions (or ways to them). Should you believe me? I’d like to 😉 Nothing prevents you for verifying. Ask Google for reports or alerts each time…

6 ways to getting rid of SPAMs

  We all receive, nearly everyday, poisoning emails. They are bothering us, make us lose time and, such as cuckoos, lay undesired eggs in our computers. What can we do to get rid of them? What is it? A small…

Who is it?

Passport please. Identity control! Today’s cryptography goes far beyond the protection of confidentiality and, in a smaller measure, integrity. In our virtual world you don’t really know who you are talking to. If someone has intercepted your encrypted message and…

No one will be spared!

It’s true and we’ll see it. It’s because insecurity is great that we must react, not getting discouraged and preparing ourselves for the storm. Doing nothing is the surest way not to survive! What happened in the Warsaw airport on…

One… Two… Three… Cypher!

Cryptography existed far before the computer. The ENIGMA* case during the Second World War is a good example. The first uses date back to more than 2000 years. To hide the meaning of a text – and doing so making…