Mastodon
About
Stormshield
The European cybersecurity choice
Our staff
Our ecosystem
Our history
Our sales offices
Our CSR approach
Join us
Contact
En
Fr
De
It
Es
Menu
Our difference
Our solutions & products
By industry
Aviation
Public Administration and Government
Critical communication
Defense and Military Organizations
Water Industry
Facility Management & Warehouse
Electric utilities
Navy
Health and Healthcare Facilities
Land transport
MSSPs and Other Service Providers
Close
All our products
Network security
Hardware firewalls
Virtual Appliances
Administration tools
Firmware
Features
Firewall comparison
Data security
Data encryption in Google Workspace
Data encryption in Gmail
Data encryption in Outlook
Data encryption in SharePoint and OneDrive
Data encryption on workstations
SDS range
Endpoint security
EDR
Protection for terminals
Protection for servers
Operational security
Features
Product range
Buy a solution Stormshield
Close
Close
Our support
With our partners
Services
Maintenance
Technical Support
Training
Professional Services
Threat Intelligence
Stormshield Academy
Close
Marketing documentation
Technical documentation
Close
Partner
Why become a partner
Join our network
All our partners
Close
News
Cybersecurity, by Stormshield
Cybersecurity, first steps
Corporate
Recruitment news
Partner news
Products & Services
Alert
Security Monitoring
Opinion articles
Technical posts
Close
Menu
Our difference
Our solutions & products
By industry
Aviation
Public Administration and Government
Critical communication
Defense and Military Organizations
Water Industry
Facility Management & Warehouse
Electric utilities
Navy
Health and Healthcare Facilities
Land transport
MSSPs and Other Service Providers
Close
All our products
Network security
Hardware firewalls
Virtual Appliances
Administration tools
Firmware
Features
Firewall comparison
Data security
Data encryption in Google Workspace
Data encryption in Gmail
Data encryption in Outlook
Data encryption in SharePoint and OneDrive
Data encryption on workstations
SDS range
Endpoint security
EDR
Protection for terminals
Protection for servers
Operational security
Features
Product range
Buy a solution Stormshield
Close
Close
Our support
With our partners
Services
Maintenance
Technical Support
Training
Professional Services
Threat Intelligence
Stormshield Academy
Close
Marketing documentation
Technical documentation
Close
Partner
Why become a partner
Join our network
All our partners
Close
News
Cybersecurity, by Stormshield
Cybersecurity, first steps
Corporate
Recruitment news
Partner news
Products & Services
Alert
Security Monitoring
Opinion articles
Technical posts
Close
Cybersecurity news, seen with an expert eye | Stormshield
60
paged,wp-singular,page-template,page-template-news-home,page-template-news-home-php,page,page-id-60,page-parent,paged-23,page-paged-23,wp-theme-bridge,wp-child-theme-wp-stormshield-theme,bridge-core-3.3.4.2,lang-en,,qode-title-hidden,qode_grid_1300,qode-child-theme-ver-1.2.4,qode-theme-ver-30.8.8.2,qode-theme-bridge,qode_header_in_grid,qode-wpml-enabled,wpb-js-composer js-comp-ver-8.5,vc_responsive
09 07 2025
Security alert Citrix NetScaler CVE-2025-5777: Stormshield Products Response
Cybersecurity, by Stormshield
Security alert Citrix NetScaler CVE-2025-5777: Stormshield Products Response
Security alert SAP CVE-2025-31324: Stormshield Products Response
Firewall robustness: a key factor in providing protection against cyberattacks
Cyber-risks in the water sector: modernise and segment to protect yourself
Cybersecurity and digital transformation: how local authorities can rise to the challenge of resilience
View all
News Flash
Security alert Citrix NetScaler CVE-2025-5777: Stormshield Products Response
Security Monitoring
09 09 2019
Should we be teaching cybersecurity in school?
Security Monitoring
02 09 2019
Top 6 most surprising entry points for cyberattacks
Security Monitoring
26 08 2019
Top 5 cyberattacks against the health care industry
Security Monitoring
19 08 2019
Top 5 most dangerous industrial cyberattacks
Security Monitoring
12 08 2019
Why your cybersecurity strategy shouldn’t depend (only) on a probe
Opinion articles
05 08 2019
The importance of using multiple solutions in cybersecurity
Opinion articles
29 07 2019
IT-OT networks: why convergence is delicate, yet crucial
Security Monitoring
22 07 2019
But who still uses Internet Explorer today?
Security Monitoring
15 07 2019
Cybersecurity: what has been happening since the beginning of 2019?
Show more
Loading...
Follow us on
Want to find out more? Fill in your preferences and keep up to date with our latest news
Update your email preferences