Risk_Insight (@risk_insight) 's Twitter Profile
Risk_Insight

@risk_insight

#Wavestone consultants' #Cybersecurity & #Digital #Trust blog. Sharing thoughts on #risk #governance #digital #identity #digital #awareness news

ID: 32373038

linkhttp://riskinsight-wavestone.com calendar_today17-04-2009 11:38:18

5,5K Tweet

4,4K Followers

1,1K Following

Risk_Insight (@risk_insight) 's Twitter Profile Photo

Construction companies use #collaborative methods, in particular the #BIM method. #Altering datas required to create these models can have serious consequences, including threatening people's #life. Discover our risks scenarios and advices to secure BIM. riskinsight-wavestone.com/en/2023/10/cyb…

Risk_Insight (@risk_insight) 's Twitter Profile Photo

The #CICD approach is an indispensable method for developing #app. Several #solutions in the #cloud exist to satisfy security and efficiency needs, notably on #AWS. Source code or flows management, IAM, AWS integrated solutions are reviewed by our experts riskinsight-wavestone.com/en/2023/11/ci-…

Risk_Insight (@risk_insight) 's Twitter Profile Photo

Artificial Intelligence: are you visionary, pragmatic, or skeptical? Between #enthusiasm and #caution, generative #AIs evoke mixed feelings. Our experts have compiled the most frequently asked questions from our clients and provided answers #AIgen #cyber riskinsight-wavestone.com/en/2023/11/ai-…

Risk_Insight (@risk_insight) 's Twitter Profile Photo

Transitional time during M&A ops is often an opportunity for #cyberattacks. #Cyber #DueDiligence adds significant #value to teams and guides decision-making on various levels. Our experts tell you the secrets to make it successful! #mergeandaquisition riskinsight-wavestone.com/en/2023/11/cyb…

Risk_Insight (@risk_insight) 's Twitter Profile Photo

5 minutes to understand PIPL, China's data protection law Passed in 2021, China's #PIPL privacy law will soon see be updated for more #flexibility on data transfer. Our experts report on: 📅 The #context 🎯 The #compliance #strategies 🔦 #Tips to prepare riskinsight-wavestone.com/en/2023/12/imp…

Risk_Insight (@risk_insight) 's Twitter Profile Photo

#Cyber sector struggles to #recruit and #retain talents. In this war for talents, how can you become more #attractive to both, candidates and those already in place? Our experts share #lessons learned from #CISOs and Talent Managers #HR #strategy riskinsight-wavestone.com/en/2023/12/the…

Risk_Insight (@risk_insight) 's Twitter Profile Photo

For organizations based in #China, #compliance with the #PIPL law on personal data transfer has led them to define the autonomy level of their Chinese entity. Depending on their #risk appetite, several #scenarios may be considered… #cyber #decoupling riskinsight-wavestone.com/en/2023/12/pip…

Risk_Insight (@risk_insight) 's Twitter Profile Photo

Did your #RedTeam consider a #cloud attack vector? Public cloud misconfigurations can allow an attacker to bypass strong tiering isolation, up-to-date OSs and full EDR coverage. Discover some of the attack paths exploited by our pentesters: github.com/wavestone-cdt/…

Risk_Insight (@risk_insight) 's Twitter Profile Photo

As the world gears up for the next #OlympicGames, it's crucial to fortify your digital defenses. Explore the new #cyber trends with our 2024 CISO #Radar: ☁ #Cloud migration 🔒 #ZeroTrust Model 🤖 #AI Powered Security 🌿 Sustainable Practices ... And more! wavestone.com/en/insight/cis…

Risk_Insight (@risk_insight) 's Twitter Profile Photo

In industrial environments, #OT teams often find themselves on their own when it comes to meet cybersecurity requirements. Therefore "home-grown" solutions are often developed, unsupervised. Discover our #methodology to build a #cyber solutions catalog! riskinsight-wavestone.com/en/2024/01/it-…

Risk_Insight (@risk_insight) 's Twitter Profile Photo

#Deceptive #security or how to trick attackers 🎩 The goal is to fool attackers into believing that #security defenses are different from what they are. Our experts answer all your questions, from the most conceptual to the most technical. riskinsight-wavestone.com/en/2024/01/dec…

Risk_Insight (@risk_insight) 's Twitter Profile Photo

In factories, most programmable logic controllers are managed by a #SCADA. Its nature makes it critical. It's therefore necessary to secure their #software. But "conventional" solutions don't meet #industrial environment constrains. #cyber #OTsecurity riskinsight-wavestone.com/en/2023/12/app…

Risk_Insight (@risk_insight) 's Twitter Profile Photo

Cloud Access Security Brokers (#CASB) are emerging as a key solution to secure #cloud usage. Our experts have analyzed Microsoft CASB, Microsoft Defender for Cloud Apps, to present you the benefits and challenges of CASB implementation. #cyber #SaaS riskinsight-wavestone.com/2024/02/micros…

Risk_Insight (@risk_insight) 's Twitter Profile Photo

#Deceptive #Security, or how to trick attackers #2 🎩 After a first article on #decoy strategy conception, our experts present a use case of deceptive security on AWS #cloud. Come discover the added value of such a strategy for cloud security. riskinsight-wavestone.com/en/2024/02/dec…

Risk_Insight (@risk_insight) 's Twitter Profile Photo

Are #industrial #PLC networks incompatible with future cybersecurity challenges? With #industrie4.0, industrial systems are increasingly interconnected. Our experts analyze the impacts of these transformations on the historical #PLC network model. riskinsight-wavestone.com/en/2024/02/plc…

Risk_Insight (@risk_insight) 's Twitter Profile Photo

The #SBOM, a vital ally for the #security of your products? Our experts show you how #SBOM can be used to improve your software security, what challenges still need to be overcome to exploit it fully, and what the outlooks are for SBOM in the future. riskinsight-wavestone.com/en/2024/03/why…

Risk_Insight (@risk_insight) 's Twitter Profile Photo

How to deal with #AI-related cyber threats? As #AI is being increasingly used within companies, come discover the insights of our experts on what new #threats this technology brings, and what measures you can take to use it in a safe and #trustworthy way. riskinsight-wavestone.com/en/2024/03/sec…

Risk_Insight (@risk_insight) 's Twitter Profile Photo

Can #AI revolutionize #IAM? 💡 Our experts examine this question by exploring several use cases around AI and IAM, to identify the #added #value of current and forthcoming solutions, and the remaining #challenges for AI integration in IAM systems. 🔍 riskinsight-wavestone.com/en/2024/03/art…

Risk_Insight (@risk_insight) 's Twitter Profile Photo

How to secure #smart #grids? That's why the #IEC #62351 norm was created, to help secure the IT network of smart grids. Discover with us this standard and its added value, to assess whether it is appropriate to seek compliance with it. riskinsight-wavestone.com/en/2024/04/iec…

Risk_Insight (@risk_insight) 's Twitter Profile Photo

While the EU has chosen the legislative path with the AI Act to reconcile #innovation and fight against the #misuse of #AI, the UK and the US have each chosen a different approach to do that. Discover them with our experts in our latest article. riskinsight-wavestone.com/en/2024/05/us-…