AppSec 2012 : conférence Kyos IT Security – Oauth

AppSec 2012 : conférence Kyos IT Security – Oauth

…savoir plus : “Sign-in using your facebook, google, linked-in or twitter account…” Porté notamment par les grands acteurs des réseaux sociaux, Oauth est devenu un standard difficilement contournable dans le paysage de la fédération d’identité. Authentifier c’est s’assurer qu’une entité est bien celle qu’elle prétend être. Oauth, quant à lui, se définit comme un “framework” d’autorisation permettan…

Lire la suite...

Conference: e-Signatures for ZertEs and eIDAS

Conference: e-Signatures for ZertEs and eIDAS

…educed operational costs, enhanced security and superior customer experience. Register here for the event: https://www.cryptomathic.com/news-events/events/e-signatures_in_the_cloud_zertes_and_eidas_conference…

Lire la suite...

User Group Meeting – 29.10.2020 (online)

User Group Meeting – 29.10.2020 (online)

…ll ask for your location when you register. But don’t worry, it will only be used for the delivery of the surprise, we promise. At this meeting we will provide up-to-date and practical information about our products, insights into customer projects as well as news and trends from the world of encryption. The illustrated agenda gives a detailed overview of the meeting. Take part in our User Group Me…

Lire la suite...

Thales User Group Meeting 2018

Thales User Group Meeting 2018

…rmation on our products, insights into some customer projects and news and trends in the world of encryption, e. g: Roadmap and Thales latest security developments Assessments and responses on topical security issues Challenges and solutions for the Cloud, IoT and blockchain Application scenarios, solution approaches and user reports Meet our experts as well as stakeholders from the automotive and…

Lire la suite...

Kyos fügt Cyberwatch zu unserem Vulnerability and Compliance managament portfolio

Kyos fügt Cyberwatch zu unserem Vulnerability and Compliance managament portfolio

Kyos hat sich mit Cyberwatch zusammengetan, um deren Plattform für Schwachstellen- und Compliance-Management in das Portfolio aufzunehmen. Mit der zunehmenden Komplexität von IT-Systeme ist es wichtiger denn je, über die richtigen Tools zu verfügen, um den Schwachstellen- und Compliance-Zustand Ihrer Infrastruktur zu erkennen und zu verfolgen. Cyberwatch kombiniert einen vor Ort installierten Sch…

Lire la suite...

CIS Videoconferencing Security Guide

CIS Videoconferencing Security Guide

In October of 2020, the Center for Internet Security (CIS) has released a Videoconferencing Security Guide. It’s goal is to provide overall security guidance to mitigate attacks and be applicable to a wide variety of videoconferencing systems and their users. With the Covid-19 pandemic, videoconferencing has become a critical business tool since in-person meetings have been discouraged or simply i…

Lire la suite...