Search

Latest articles

View:
Benoit Voirin
Benoit Voirin
Cybersecurity Consultant. Benoit has extensive experience in cybersecurity strategy, infrastructure project management, and IT system engineering. He is a certified ISO 27001 Lead Implementer.
Benoit Voirin

Secure Software Development Lifecycle

The functioning of any enterprise IT infrastructure depends on multiple factors, which may or may not correlate with each other well. For instance, it is widely believed that security is slowing development processes. However, a secure Software Development Lifecycle will make sure that both your development and security teams deliver secure software with no delay.

Benoit Voirin

How to secure data in the cloud?

The topic of cybersecurity can be overloaded, especially when it comes to cloud. That’s why, when things get too loud, it’s good to return to the basics. Knowing the most common threats to cloud storage and the established strategies to deal with them will make a good foundation for building your own data security.

Benoit Voirin

Identity as a Service (IDaaS)

IDaaS offers the benefits of hybrid IT by providing cloud-based Identity and Access Management (IAM). The service ensures that users are who they claim to be, and provides them with appropriate access to specific resources at a proper time. It’s maintained by the service provider and needs little resources or effort to jumpstart.

Benoit Voirin

How to Increase Security in Remote Work Conditions Using Mobile Device Management

Having unmanaged remote endpoints, overall, and in remote work specifically, can lead to unauthorized data access, data leakage, or even worse security compromise cases. Mobile Device Management solutions will allow you to tailor security policies, push security policies, settings and software on your employee remote-access devices, and identify potential vulnerabilities.

Benoit Voirin

Assessing Your Active Directory

Evaluating the state of your Active Directory (AD) is perceived as a laborious and complex task. If you do that manually, then perhaps it is. However, checking up on the state of your AD is necessary to rule out potential threats to your environment. Luckily, there’s one tool that can help you generate a comprehensive security report on your chosen AD within minutes.

Benoit Voirin

Identity and Access Management (IAM) in a nutshell

It’s a misconception that only a hacker attack is the biggest threat to cybersecurity. In reality, employees not abiding by basic security protocols during their routine work is the biggest “backdoor.” Making sure that all roles, privileges, and systems are set to avoid any outside access is paramount for ensuring your company’s solid daily cybersecurity.

Benoit Voirin

Email and Web Browser protection

If your browsers and email aren’t secured properly, then your network and users aren’t either. Properly securing your organization’s daily browsing activity can hinder the majority of cybersecurity compromisation cases. Issues like filtering, sender policy framework (SPF), browser types and browsing limitations are all detrimental.

Benoit Voirin

How to Use Snyk to Scan Images for Vulnerabilities

When people think “cybersecurity,” images will be the last thing to come to mind. Usually, users tend to focus on things like cyber-attacks, viruses, or malware. Well, regular images, depending on where they come from, their integrity, and the routing can become a micro-gap in your security which can then result in a breach.

Benoit Voirin

Cyber Security – Where to Start – Part 3

In the previous parts, we talked about general cybersecurity boundaries and staff education on the topic. The third crucial aspect is preparation, which allows minimizing the aftermaths if a cyber-attack does happen. Backups and crisis planning are two key activities that you have to manage so that you can effectively recover in case your cybersecurity is compromised.

Benoit Voirin

Cyber Security – Where to Start – Part 2

If the previous part, you read about general boundaries of cybersecurity and why it’s mandatory to uphold. Continuing the topic, the initial steps to ensuring your business is cyber-secure, you need to create a solid foundation. Baseline OS security tools have to be configured and active 24/7, and much success of cybersecurity depends on educating your staff.