News

KYOS & REGDATA Unveil Strategic Alliance
Dear Madam, Dear Sir, Geneva, 11th of September 2023 – Today, REGDATA, with its innovative in RPS Data Protection & Governance platform, and KYOS, a …

nLPD (nFADP) comes into force : obligations and opportunities
The revised Data Protection Act (DPA) has been in force since September 1, 2023, with no transition phase. Its main objective is to protect the …

Establish a climate of trust
The term “climate of trust” is much more than just a concept. It’s the glue that forges strong relationships and fosters personal fulfillment within the …

Sign your PDFs with an electronic signature
How can you make sure that the PDF is electronically signed while maintaining its authenticity and legal value as when you printed and signed it …

Thales creates CDSP out of Vormetric and KeySecure
CDSP out of Vormetric and KeySecure In 2014, when they approached us, Vormetric was already an established company and their Data Security appliance convinced more …

Cyber-Safe certified
Have you ever heard of the Cyber-Safe label? The Cyber-Safe label is a guarantee of cybersecurity quality for Swiss SMEs. As an IT service provider …

Improve your agility with security
Access your internal resources seamlessly, or when security improves agility The way we work has changed dramatically over the last two years, bringing new challenges …

A climate of trust through the culture of feedback
Establishing a climate of trust is like filling a bucket of water with a spoon in the middle of a battlefield; at the slightest jostle, …

SecurityScorecard x Kyos – Winetasting Webinar
SecurityScorecard x Kyos – Winetasting Webinar Together with SecurityScorecard we are pleased to organise this event as an online wine tasting webinar. It will take place on …

KYOS about the Kaspersky situation
As a Kaspersky Gold partner, we feel that it is time to communicate about the recent situation regarding Kaspersky Antivirus. As you may know, Kaspersky …

We successfully renewed our Crest Membership
Kyos team is proud to announce that we successfully renewed our Crest Membership. This accreditation allows our clients to get CREST Certified penetration testings directly …

ISO 27001 certified
We decided to take the leap to be ISO 27001 compliant – here we are, a year later, proudly announcing that we have successfully passed …

Get ready, Wi-Fi 6E is coming
What’s going on? Europe has just authorized the exploitation without license of the 6 GHz frequency band (in the 5925-6425 Mhz range) in order to …

Thales Double Key Encryption (DKE)
Announcing Thales HSM Backed Double Key Encryption for Microsoft Office 365 – The best of both worlds Today’s remote working environment relies heavily on the …

Rebranding at KYOS
A new identity for even more expertise With the aim of constantly listening to our employees and our stakeholders in a more global sense, we …

Thales HSM vs DpoD Cloud
High Assurance Hardware Security Modules Secure your sensitive data and critical applications by storing, protecting and managing your cryptographic keys in Luna Network Hardware Security Modules (HSMs) – high-assurance, tamper-resistant, network-attached appliances offering market-leading performance.

Exchange zero-day Exploit
Whether you are a Kyos customer or not, considering the criticality of this flaw, we offer you a free primary investigation of your Exchange server, to determine if it is still vulnerable, as well as to identify if any potential attacks have taken place, which we know is very likely. Even though Kyos Exchange Servers have not been affected, 50% of our customers with on-premise Exchange Servers have been impacted, despite the application of the patch that we performed the same day.

0-day Vulnerability
On March 2, Microsoft has released an emergency security update for Microsoft Exchange to remediate six vulnerabilities allowing remote code execution, of which 4 can bypass any authentication control.

What is Double Key Encryption (DKE)?
1. Introduction What is DKE? DKE – or Double Key Encryption– is a new option offered by Microsoft Information Protection (MIP), a cloud-based data classification …

Security of data in the cloud
The concept of Cloud has evolved in the last 20 years, and security concerns have grown with it. The first serious effort to provide data hosting in the Cloud comes with Amazon Simple Storage Service (S3), and with it the security burden to make sure that correct permissions were configured to avoid private data to become public.
More information on this subject?
We are at your disposal!