Encryption, the key to sovereignty ?

Data sovereignty is not limited to geographic location. There are many other dimensions to consider, but let us focus on who can technically access the data stored by a Cloud Service Provider (CSP). Too often, data is…

The 5 main IT security threats in business

IT security has become an absolute imperative for all businesses, regardless of their size or field of activity. Cyclop offers a review of the 5 most common IT security threats you may face today, along…