Docker

Docker: Best Security Practices

Hi there, let’s start by saying that Docker is great, for many reasons. To mention one, the possibility of using a simple and lightweight tool to manage and deploy apps during all phases of their lifecycle. For the sake of clarity, it is worth pointing out that Docker leverages a number of tools and mechanisms that…

man in the Cloud Attack

Cloud Storage: How to protect user credentials against malware

Hi there, recently, during the Black Hat USA 2015 event, some cyber security experts from Imperva unveiled a serious vulnerability that affected (it’s been fixed now) several major Cloud Storage services such as Google Drive and Dropbox. Also, they put in place a practical attack named “Man in the Cloud” (in French). The vulnerability and the corresponding attack…

CapturFiles-20140115_160180

How to outsource your data to the Cloud without losing confidentiality and control

Hi there, recently, data leaks and various security incidents have been constantly part of daily news and scandals. From an end-user point of view, it looks like storing confidential data in the cloud is a serious risk, especially when dealing with sensitive and strategic data. Why? Thanks to the confession of Edward Snowden, we now know for sure…

SecludIT at #FIC2014

SecludIT has been selected for being one of the Innovating SMB Company during the “Forum International de la Cybercriminalité” in Lille. I personally had the chance to meet Jean-François Audenard which is Cyber Security Advisor at Orange. I really appreciated and had a lot of fun making a short video with him. Please take a…