BLOG PRIM’X
Encryption and data confidentiality
Highlights
Encryption ABC's
5 preconceived ideas about encryption!
Too many preconceived ideas about encryption stop companies from taking action. Such reticence can be costly when sensitive data is leaked and disclosed. A look at five stubborn misconceptions...
Learn moreIdeas & initiatives
Why must you manage your service providers’ and suppliers’ cyber risks?
Outsourcing is a widespread practice in many sectors: construction, transport, services, etc. It’s also true of IT departments in which many CIOs use service providers to support their in-house teams.
Learn moreEncryption ABC's
The key 5 factors in a successful encryption project
To be effective, encryption strategies must be approached as a whole: It's just as important to protect from external threats as it is to compartmentalize the information system and provide…
Learn moreTech culture
AI and cybersecurity: marketing pitch or true progress?
For now, artificial intelligence's contribution to cybersecurity solutions is limited to the detection of advanced threats. AI isn’t able to automate incident response yet. The reliability of algorithmic models is…
Learn moreEncryption ABC's
NIS2: how to get ready?
As cyberthreats increase, the NIS2 directive is a Europe-wide opportunity for thousands of entities that have everyday interactions with citizens to better protect themselves. It will be enacted into French…
Learn moreTech culture
DPOs and CISOs what are the synergies?
Two key professions in the administration of organizations have emerged in recent years: the Chief Information Security Officer (CISO) - due to the growing pressure from cyber-attacks - and the…
Learn moreEncryption ABC's
Cloud Computing: our glossary of 25 key words
Cloud computing represents a new era in computing. It comes with its share of acronyms and new vocabulary. PRIM'X helps you make sense of this increasingly impenetrable jargon!
Learn moreEncryption ABC's
The security stack: an essential approach to data protection
In the cybersecurity world, there’s no miracle software that will protect you from every attack. Security must be provided by a series of solutions that each protect against well-defined risks.…
Learn moreIdeas & initiatives
Raising employee awareness: a data protection prerequisite
In a world in the throes of a fundamental digital revolution, the data security question is becoming increasingly important. Over 50% of French companies admit to having been targeted by…
Learn moreIdeas & initiatives
The Cloud: what threat is it to your data?
By spreading data in the cloud, the generalization of cloud technologies mechanically increases the amount of exposure to risks. Companies must identify these threats and know their role in terms…
Learn moreTech culture
Symmetric and asymmetric: why two types of encryption?
Encryption is one of the solutions to protect yourself and guarantee confidentiality. There are actually two main families: asymmetric encryption (e.g.: RSA, ECDSA) and symmetric encryption (e.g: AES-256). Each has…
Learn more