You searched for
encryption
https://www.stormshield.com/news/anatomy-of-a-malware-attack/
It can arrive in computer files, emails, USB sticks & cables, and chips of all kinds... but where does the malware that infects devices come from? And where does it hide once the device is infected? How can you protect yourself? We present an educational...https://www.stormshield.com/news/black-basta-security-alert-what-are-stormshield-protections/
A new group of cyber criminals, Black Basta, is making the news at the end of April, having already impacted more than 12 companies. The group is very young, as their first identified target only dates from the first half of April. But given their...https://www.stormshield.com/news/cyberattacks-local-authorities-are-seeking-countermeasures/
Because they handle a lot of personal and sensitive data concerning their citizens and since the continuity of public service is a major issue for them, cyberattacks are targeting more and more local authorities. From major cities to small town councils, how can these threats...https://www.stormshield.com/news/do-we-have-a-firewall-on-board/
Keeping step with developments in civil aircraft, military aircraft are increasingly embracing digital technologies and relying on a plethora of connections to ground-based systems. While this hyper-connectivity provides a solution to vital operational requirements, it is also a source of new cyber-vulnerabilities. What are these?...