Security Operations

Understand the new challenges of security operations, from technological advancements to methods and organizational structures.

Filter by:

Making room for intelligence at the edge

A Bytecode VM for liblognorm And why it unlocks a new generation of threat detection at the edge Jérémie Jourdin - CTO, Advens - March 2026 Normalize first, normalize at the edge Before diving into…
14 Apr, 2026 min
Une fuite de données chez Free, Cegedim ou à la direction générale des finances publiques : le sujet fait la une des médias, et, le lendemain matin, les téléphones de beaucoup de RSSI sonnent. Un collaborateur a reçu un e-mail suspect. Un autre signale que son adresse professionnelle figure dans une liste circulant sur un forum. Toutes les directions demandent si « on est concernés ». Les utilisateurs se demandent que faire en cas de vol de données massif.

Massive data breach: what should be done?

26 Mar, 2026 min

How to properly back up industrial systems?

16 Oct, 2025 min

XDR: Going further with MDR

20 May, 2025 min

Introduction to responsible AI

20 May, 2025 min

Ransomware attack: our CERT’s response in detail

20 May, 2025 min

Overview of the MITRE ATT&CK framework

20 May, 2025 min

With CSPM, a light on cloud security

19 May, 2025 min
https://www.cyberun.net/

Looking past the hype: the reality of automation in operational cyber security

19 May, 2025 min
The Endpoint Detection & Response (EDR) is becoming essential for the protection of endpoints (whether on desktops, servers, mobiles or tablets) against threats and cyber-attacks. But how can we make sure that we make the best use of this powerful solution that provides a large volume of information?

EDR-as-a-Service, to increase the power of EDR

19 May, 2025 min