IT Security Breakfast – Wednesday 8th of May 2019

IT Security Breakfast – Wednesday 8th of May 2019

Simply protect your on-premise or cloud data with transparent encryption More details Compliance with data privacy and security requirements is one of the main drivers for the intensive use of encryption in companies. The benefits of Thales Vormetric and how these technologies can be reflected in an enterprise-wide encryption strategy. Kyos will present you with different use cases, especially for GDPR compliance. Topics covered Advantages of...

Read More

Terranova Security named Consumer Choice for Security Awareness – see Gartner Magic Quadrant

Terranova Security named Consumer Choice for Security Awareness – see Gartner Magic Quadrant

Security awareness and learning (IS/IT) is at the heart of Terranova’s activity with a high level of expertise. Terranova’s solutions and Kyos’ services can – deliver a complete action plan – to raise awareness among your employees over time. Full program: Evaluation questionnaire, e-learning, standard/personalized phishing, standard/personalized social engineering, plenary session & workshop session using...

Read More

Swiss Cyber Security Days

Swiss Cyber Security Days

SCSD Fribourg – Thursday 28th of February 2019 – 14:30 – Track C1 Speaker: Martino Dell’Ambrogio, Security Architect at Kyos Kyos feedback on risks and best practices related to the establishment or augmentation of a SIEM/SOC infrastructure based on practical experiences.  Introduction to key strengths of LogRhythm SIEM and terreActive SOC. Register Kyos, terreActive and LogRhythm invite you to the Swiss Cyber Security...

Read More

Cyber threat protection targeting industrial networks – Kaspersky ICS (KICS)

Industrial networks are very often the most forgotten aspects of IT security, even though they are a vital part of our modern life. There are many reasons for this, but the main ones are: Business and approaches are historically separated from standard IT, Often mistaken idea that industrial networks are completely isolated from the rest of the world, Software that has been running for a very long time on obsolete operating systems that are...

Read More

Thales User Group Meeting 2018

Thales User Group Meeting 2018

  Attend the Thales e-Security HSM User Group Meeting, benefit from the know-how of various experts and discover the evolution of the market, on Wednesday 24 October 2018 at the Radisson Blue Hotel, Zurich Airport. We provide up-to-date and practical information on our products, insights into some customer projects and news and trends in the world of encryption, e. g: Roadmap and Thales latest security developments Assessments and responses on...

Read More

Security of web services and applications – new challenges and how to address them?

Security of web services and applications – new challenges and how to address them?

Kyos organized together with F5 in September 2018 a “Learn & Sail” and a Technical Workshop with topic “Security of web services and applications – new challenges and how to meet them?” Topics covered What are the challenges for the new microservice architectures, the different cloud platforms: CAAS, PAAS, FAAS and SAAS. DevOp trend – automation and orchestration: How to integrate application security...

Read More

Fastbooking Hacking: How can you comply with the GDPR after the theft of hotel guest data?

Fastbooking Hacking: How can you comply with the GDPR after the theft of hotel guest data?

Fastbooking, the AccorHotels subsidiary specializing in digital hotel services, confirmed that it was the victim of a hacking attack in which the booking data was stolen from private individuals. The Kyos law expert Dashnim Murati explains the requirements of the GDPR, the hoteliers in the case of a data theft have to fulfill. As you may be aware, the General Data Protection Regulations (GDPR) were approved by the European Parliament on 14...

Read More

Fortinet Security Fabric, protection against sophisticated threats

Fortinet Security Fabric, protection against sophisticated threats

Fortinet Security Fabric makes advanced security features accessible to SMEs, with cross-functional and simplified management: High-performance Next-Generation Firewall with IPS, Software-Defined WAN and Secure Web Gateway. Multi-Cloud dynamic security with Fortinet’s Multi-Cloud Security, Web application security with FortiWeb and FortiADC Application Delivery Controllers Email security with FortiMail Advanced threat protection by...

Read More

How to protect, backup, audit and synchronize your private encryption keys stored in an Azure Key Vault (Software or HSM)

How to protect, backup, audit and synchronize your private encryption keys stored in an Azure Key Vault (Software or HSM)

Thanks to the Thales CipherTrust Cloud Key Manager (CCKM) solution, we can now have control over the private encryption keys used in Azure and Office 365 stored in Azure Key Vault. The CCKM solution allows you to manage the life cycle of private keys. Private keys are stored in a Vormetric DSM (On-premises Hardware, Cloud and On-premises Software) digital safe The Thales CCKM appliance is deployed either on site or as a cloud service. Here is...

Read More