KYOS

Search Results for: about

Pentests guide: Protecting your systems from cyber threats

Understanding Pentests: A comprehensive guide In today’s digital landscape, where cyber threats are ever-evolving, safeguarding your organization’s critical assets and sensitive information is paramount. There is no room for complacency when it comes to security. Pentests, short for penetration tests, are a crucial component of your organization’s overall security strategy, enabling you to proactively identify

Pentests guide: Protecting your systems from cyber threats Read More »

ENTRÉE EN VIGUEUR DE LA NLPD : DES OBLIGATIONS ET DES OPPORTUNITÉS

nLPD (nFADP) comes into force : obligations and opportunities

The revised Data Protection Act (DPA) has been in force since September 1, 2023, with no transition phase. Its main objective is to protect the personality and fundamental rights of individuals, whose data is processed by private players or the authorities. The law demands maximum transparency, giving individuals greater control over their own information. It

nLPD (nFADP) comes into force : obligations and opportunities Read More »

Privacy policies

Presentation Collection of personal data Marketing profiling Cookies Legal basis for collection Recipients of personal data Retention periods Transfers outside the European Union (EU) Individual rights of data subjects Changes to this policy Contact 1. Presentation As Kyos, a public limited company, with headquarter in Switzerland, Chemin Frank-Thomas, 32, 1208 Geneva, we are committed to

Privacy policies Read More »

Exchange zero-day Exploit

Whether you are a Kyos customer or not, considering the criticality of this flaw, we offer you a free primary investigation of your Exchange server, to determine if it is still vulnerable, as well as to identify if any potential attacks have taken place, which we know is very likely. Even though Kyos Exchange Servers have not been affected, 50% of our customers with on-premise Exchange Servers have been impacted, despite the application of the patch that we performed the same day.

Exchange zero-day Exploit Read More »

Training

Main Menu Audit and Pentests Identity and Access Perimeter and Content Endpoint Data and Encryption Training Event Management Training and Awareness Provide your employees with the knowledge to better understand human vulnerabilities and show them that data and information protection is about more than just securing IT systems.  In this area we offer the following solutions

Training Read More »

Illustration de double key encryption

What is Double Key Encryption (DKE)?

1. Introduction What is DKE? DKE – or Double Key Encryption– is a new option offered by Microsoft Information Protection (MIP), a cloud-based data classification and protection software. Given that many customers are worried to start their journey to the cloud because of data protection concerns, Microsoft implemented a new option to protect unstructured data

What is Double Key Encryption (DKE)? Read More »