Good practice in using Azure Information Protection to protect your data

Good practice in using Azure Information Protection to protect your data

At the end of 2016 Microsoft officialized the release of the Azure Information Protection solution. This cloud-driven solution is a kind of evolution of the RMS (Rights Management System) suite. It will allow you to create a document classification policy and then apply protection profiles to encrypt sensitive documents. At Kyos we started evaluating the tool in July 2017. We quickly realized…

Lire la suite...

Swiss Cyber Security Days

Swiss Cyber Security Days

SCSD Fribourg – Thursday 28th of February 2019 – 14:30 – Track C1 Speaker: Martino Dell’Ambrogio, Security Architect at Kyos Kyos feedback on risks and best practices related to the establishment or augmentation of a SIEM/SOC infrastructure based on practical experiences. Introduction to key strengths of LogRhythm SIEM and terreActive SOC. Register Kyos, terreActive and…

Lire la suite...

New features of AIP Azure Information Protection announced at MSingnite

New features of AIP Azure Information Protection announced at MSingnite

Not having had the chance to free myself to go to Ignite, I nevertheless had time to attend a multitude of very interesting sessions. Last year Kyos began an in-depth evaluation of the document classification and encryption solution. For a quick presentation of this solution click on the article. AIP is now an integral part of Microsoft Information protection strategy, which brings a unification…

Lire la suite...

Windows 7 and other Microsoft products at the end of support, what impact for you ?

Windows 7 and other Microsoft products at the end of support, what impact for you ?

Background Since its release in 2009, the Windows 7 operating system has been gradually adopted by most companies. Since Windows 8 did not meet with unanimous success, it will experience its first loss of speed only in 2015, the year Windows 10 entered the market, remaining today the last client operating system marketed by Microsoft. Today, Windows 7 maintain a significant market share of about…

Lire la suite...

How to protect, backup, audit and synchronize your private encryption keys stored in an Azure Key Vault (Software or HSM)

How to protect, backup, audit and synchronize your private encryption keys stored in an Azure Key Vault (Software or HSM)

Thanks to the Thales CipherTrust Cloud Key Manager (CCKM) solution, we can now have control over the private encryption keys used in Azure and Office 365 stored in Azure Key Vault. The CCKM solution allows you to manage the life cycle of private keys. Private keys are stored in a Vormetric DSM (On-premises Hardware, Cloud and On-premises Software) digital safe The Thales CCKM appliance is…

Lire la suite...

Terranova Security named Consumer Choice for Security Awareness – see Gartner Magic Quadrant

Terranova Security named Consumer Choice for Security Awareness – see Gartner Magic Quadrant

Security awareness and learning (IS/IT) is at the heart of Terranova’s activity with a high level of expertise. Terranova’s solutions and Kyos’ services can – deliver a complete action plan – to raise awareness among your employees over time. Full program: Evaluation questionnaire, e-learning, standard/personalized phishing, standard/personalized social engineering,…

Lire la suite...

Threat detection with Microsoft ATA and Azure ATP – Tuesday, October 16, 2018

Threat detection with Microsoft ATA and Azure ATP – Tuesday, October 16, 2018

Kyos organized an After Work in partnership with Microsoft. Set up with the aim of providing you with concise information focused on the issues faced by IT managers, the After Work sessions organised by Kyos are a point of information and exchange with our teams and partners. Tuesday, October 16, 2018 Threat detection with Microsoft ATA and Azure ATP Topics covered : Understand how Microsoft…

Lire la suite...

Fortinet Security Fabric, protection against sophisticated threats

Fortinet Security Fabric, protection against sophisticated threats

Fortinet Security Fabric makes advanced security features accessible to SMEs, with cross-functional and simplified management: High-performance Next-Generation Firewall with IPS, Software-Defined WAN and Secure Web Gateway. Multi-Cloud dynamic security with Fortinet’s Multi-Cloud Security, Web application security with FortiWeb and FortiADC Application Delivery Controllers Email security…

Lire la suite...

Fastbooking Hacking: How can you comply with the GDPR after the theft of hotel guest data?

Fastbooking Hacking: How can you comply with the GDPR after the theft of hotel guest data?

Fastbooking, the AccorHotels subsidiary specializing in digital hotel services, confirmed that it was the victim of a hacking attack in which the booking data was stolen from private individuals. The Kyos law expert Dashnim Murati explains the requirements of the GDPR, the hoteliers in the case of a data theft have to fulfill. As you may be aware, the General Data Protection Regulations (GDPR)…

Lire la suite...