Skip to content

Blog

2024

3 days at the InCyber Forum 2024

A look back at these 3 intense days at the InCyber Forum (FIC) 2024, from March 26 to 28 at the Lille Grand Palais, marked by several highlights and many meetings.

This 16th edition was a great success with over 17,000 visitors to the show over the 3 days!

Chimere partner of the InCyber Forum 2024

We are thrilled to announce that Chimere will be a partner of the InCyber Forum 2024, which will take place from March 26 to 28 at Lille Grand Palais.

The Incyber Forum is one of the most important events in the cybersecurity industry in Europe, bringing together professionals from around the world to discuss the latest trends and challenges in IT security. This is an opportunity for Chimere to present its Cyberstealth® solution and meet other actors in the ZTNA and cybersecurity fields.

Effectively manage your exposure surface (Part 2)

In the previous article Effectively Managing Your Attack Surface (Part 1), we used the tool Uncovery - Advanced EASM to get an accurate view of the attack surface of the information system. The results showed 160 services exposed on the internet network, intended for a well-defined user population. In this article, we will show how to use Chimere to secure all of these services and remove them from the attack surface while keeping them accessible to employees.

To do this, we will use the automatic service enrollment mechanism offered by Chimere and then connect the company's identity provider to the Chimere Manager to provide user access to services.

Effectively manage your exposure surface (Part 1)

When you are a CISO or CIO taking on a new position, one of the challenges is to efficiently understand the areas where protection measures and security actions need to be implemented. Esteemed readers of this blog, you know how exposing applications on the internet is one of the most common causes of information system compromise. If this is your first Chimere article, take a look at our previous thoughts on the subject: 10 cyberattacks that exploited the principle of exposure, 3 types of attacks feared by companies, and 3 strategies to protect your information system from internet scans (and resulting attacks)

In this article, we provide a method to identify and manage this exposure, ultimately reducing the risk of compromise resulting from the exposure of your assets on the internet.

Loading...