Benoit Voirin
Benoit Voirin
Benoit Voirin is a freelance Cyber Security consultant with 10 years of experience in Cyber Strategy, infrastructure project management and IT System Engineering. Benoit has a wild range of skills in cyber security strategy and technical domains gained by working on vast and challenging projects in multiple domains and sectors. He is certified ISO 27001 Lead Implementer, Cloud Security Knowledge (from Cloud Security Alliance), Prince 2 and ITIL.

All posts by Benoit Voirin

Posted by Benoit Voirin on March 12, 2020
How to Use Snyk to Scan Images for Vulnerabilities

When people think “cybersecurity,” images will be the last thing to come to mind. Usually, users tend to focus on things like cyber-attacks, viruses, or malware. Well, regular images, depending on where they come from, their integrity, and the routing can become a micro-gap in your security which can then result in a breach.

Learn More

Posted by Benoit Voirin on February 18, 2020
Cyber Security – Where to Start – Part 3

In the previous parts, we talked about general cybersecurity boundaries and staff education on the topic. The third crucial aspect is preparation, which allows minimizing the aftermaths if a cyber-attack does happen. Backups and crisis planning are two key activities that you have to manage so that you can effectively recover in case your cybersecurity is compromised.

Learn More

Posted by Benoit Voirin on November 28, 2019
Cyber Security – Where to Start – Part 2

If the previous part, you read about general boundaries of cybersecurity and why it’s mandatory to uphold. Continuing the topic, the initial steps to ensuring your business is cyber-secure, you need to create a solid foundation. Baseline OS security tools have to be configured and active 24/7, and much success of cybersecurity depends on educating your staff.

Learn More

Posted by Benoit Voirin on October 22, 2019
Hardening Linux: Essential Steps for Boosting Linux Server Cybersecurity

We often tend to believe that operating systems are secured by default, but securing your Linux servers to protect your data, intellectual property and time is the responsibility of the system administrator.

In this post we will review some of the basics operations that shall always be done while installing a new Linux server. We will use Debian as an example for the different commands but finding the rights commands for RedHat, CentOs or any other Linux distribution should be quite straight forward once you know what you are looking for and what you’d like to achieve.

Learn More

Posted by Benoit Voirin on September 24, 2019
Cyber Security – Where to start – part 1

Nowadays it’s quite trendy to have penetration testing as a starting point for cybersecurity. Even though penetration testing is a good practice, it’s very limited and focused on one application/product and should therefore not be used as an entry point for cybersecurity.

Learn More