BLOG PRIM’X

Encryption and data confidentiality

Highlights

Encryption ABC's

5 preconceived ideas about encryption!

Too many preconceived ideas about encryption stop companies from taking action. Such reticence can be costly when sensitive data is leaked and disclosed. A look at five stubborn misconceptions...

Learn more

Ideas & initiatives

Why must you manage your service providers’ and suppliers’ cyber risks?

Outsourcing is a widespread practice in many sectors: construction, transport, services, etc. It’s also true of IT departments in which many CIOs use service providers to support their in-house teams.

Learn more

Encryption ABC's

The key 5 factors in a successful encryption project

To be effective, encryption strategies must be approached as a whole: It's just as important to protect from external threats as it is to compartmentalize the information system and provide…

Learn more

Tech culture

AI and cybersecurity: marketing pitch or true progress?

For now, artificial intelligence's contribution to cybersecurity solutions is limited to the detection of advanced threats. AI isn’t able to automate incident response yet. The reliability of algorithmic models is…

Learn more

Encryption ABC's

NIS2: how to get ready?

As cyberthreats increase, the NIS2 directive is a Europe-wide opportunity for thousands of entities that have everyday interactions with citizens to better protect themselves. It will be enacted into French…

Learn more

Tech culture

DPOs and CISOs what are the synergies?

Two key professions in the administration of organizations have emerged in recent years: the Chief Information Security Officer (CISO) - due to the growing pressure from cyber-attacks - and the…

Learn more

Encryption ABC's

Cloud Computing: our glossary of 25 key words

Cloud computing represents a new era in computing. It comes with its share of acronyms and new vocabulary. PRIM'X helps you make sense of this increasingly impenetrable jargon!

Learn more

Encryption ABC's

The security stack: an essential approach to data protection

In the cybersecurity world, there’s no miracle software that will protect you from every attack. Security must be provided by a series of solutions that each protect against well-defined risks.…

Learn more

Ideas & initiatives

Raising employee awareness: a data protection prerequisite

In a world in the throes of a fundamental digital revolution, the data security question is becoming increasingly important. Over 50% of French companies admit to having been targeted by…

Learn more

Ideas & initiatives

The Cloud: what threat is it to your data?

By spreading data in the cloud, the generalization of cloud technologies mechanically increases the amount of exposure to risks. Companies must identify these threats and know their role in terms…

Learn more

Tech culture

Symmetric and asymmetric: why two types of encryption?

Encryption is one of the solutions to protect yourself and guarantee confidentiality. There are actually two main families: asymmetric encryption (e.g.: RSA, ECDSA) and symmetric encryption (e.g: AES-256). Each has…

Learn more