Security Operations

Understand the new challenges of security operations, from technological advancements to methods and organizational structures.

Filter by:

XDR: Going further with MDR

As powerful and popular as it is, Endpoint Detection and Response (EDR) has its limits, even if you entrust its management to a specialist. As the name suggests, the EDR focuses on endpoints and detects…
20 May, 2025 min

Introduction to responsible AI

20 May, 2025 min

Ransomware attack: our CERT’s response in detail

20 May, 2025 min

Overview of the MITRE ATT&CK framework

20 May, 2025 min

With CSPM, a light on cloud security

19 May, 2025 min
https://www.cyberun.net/

Looking past the hype: the reality of automation in operational cyber security

19 May, 2025 min
The Endpoint Detection & Response (EDR) is becoming essential for the protection of endpoints (whether on desktops, servers, mobiles or tablets) against threats and cyber-attacks. But how can we make sure that we make the best use of this powerful solution that provides a large volume of information?

EDR-as-a-Service, to increase the power of EDR

19 May, 2025 min

aDvens positioned as a Leader in the ISG Provider Lens™

19 May, 2025 min

[Infographic] Respond to ransomware in 5 steps

27 Apr, 2023 min
Attaque par ransomware

Ransomware Attack: A Detailed Intervention by Our CERT

27 Apr, 2023 min