Search

Latest articles

View:
Benoit Voirin
Benoit Voirin
Cybersecurity Consultant. Benoit has extensive experience in cybersecurity strategy, infrastructure project management, and IT system engineering. He is a certified ISO 27001 Lead Implementer.
Benoit Voirin
  • Benoit Voirin
  • September 15, 2022

Secure Software Development Lifecycle

The functioning of any enterprise IT infrastructure depends on multiple factors, which may or may not correlate with each other well. For instance, it is widely believed that security is slowing development processes. However, a secure Software Development Lifecycle will make sure that both your development and security teams deliver secure software with no delay.
Read more
Benoit Voirin
  • Benoit Voirin
  • June 30, 2022

How to secure data in the cloud?

The topic of cybersecurity can be overloaded, especially when it comes to cloud. That’s why, when things get too loud, it’s good to return to the basics. Knowing the most common threats to cloud storage and the established strategies to deal with them will make a good foundation for building your own data security.
Read more
Benoit Voirin
  • Benoit Voirin
  • October 26, 2021

Identity as a Service (IDaaS)

IDaaS offers the benefits of hybrid IT by providing cloud-based Identity and Access Management (IAM). The service ensures that users are who they claim to be, and provides them with appropriate access to specific resources at a proper time. It’s maintained by the service provider and needs little resources or effort to jumpstart.
Read more
Benoit Voirin
  • Benoit Voirin
  • June 24, 2021

How to Increase Security in Remote Work Conditions Using Mobile Device Management

Having unmanaged remote endpoints, overall, and in remote work specifically, can lead to unauthorized data access, data leakage, or even worse security compromise cases. Mobile Device Management solutions will allow you to tailor security policies, push security policies, settings and software on your employee remote-access devices, and identify potential vulnerabilities.
Read more
Benoit Voirin
  • Benoit Voirin
  • March 2, 2021

Assessing Your Active Directory

Evaluating the state of your Active Directory (AD) is perceived as a laborious and complex task. If you do that manually, then perhaps it is. However, checking up on the state of your AD is necessary to rule out potential threats to your environment. Luckily, there’s one tool that can help you generate a comprehensive security report on your chosen AD within minutes.
Read more
Benoit Voirin
  • Benoit Voirin
  • October 22, 2020

Identity and Access Management (IAM) in a nutshell

It’s a misconception that only a hacker attack is the biggest threat to cybersecurity. In reality, employees not abiding by basic security protocols during their routine work is the biggest “backdoor.” Making sure that all roles, privileges, and systems are set to avoid any outside access is paramount for ensuring your company’s solid daily cybersecurity.
Read more
Benoit Voirin
  • Benoit Voirin
  • August 13, 2020

Email and Web Browser protection

If your browsers and email aren’t secured properly, then your network and users aren’t either. Properly securing your organization’s daily browsing activity can hinder the majority of cybersecurity compromisation cases. Issues like filtering, sender policy framework (SPF), browser types and browsing limitations are all detrimental.
Read more
Benoit Voirin
  • Benoit Voirin
  • March 12, 2020

How to Use Snyk to Scan Images for Vulnerabilities

When people think “cybersecurity,” images will be the last thing to come to mind. Usually, users tend to focus on things like cyber-attacks, viruses, or malware. Well, regular images, depending on where they come from, their integrity, and the routing can become a micro-gap in your security which can then result in a breach.
Read more
Benoit Voirin
  • Benoit Voirin
  • February 18, 2020

Cyber Security – Where to Start – Part 3

In the previous parts, we talked about general cybersecurity boundaries and staff education on the topic. The third crucial aspect is preparation, which allows minimizing the aftermaths if a cyber-attack does happen. Backups and crisis planning are two key activities that you have to manage so that you can effectively recover in case your cybersecurity is compromised.
Read more