About ITrust

This author has not yet filled in any details.
So far ITrust has created 43 blog entries.

Feedback Session : Kryptis Malware Detection

The Kryptis malware recently attempted to spread through the infrastructure of one of our customers, a SME-sized company, operating in the legal sector. Countered by our teams, this threat followed the attack patterns of modern malwares,which are difficult Difficult to detect with traditional tools, this customer case highlights the weaknesses of perimeter defense logics. In this post we explain, in a pedagogical way, how we were able to block this cyber attack by exploiting the triptych: SIEM UEBA / Threat Intelligence / Human Expertise. The Kryptis malware The Reveelium UEBA SIEM started by detecting attempts to access the Dark Web, [...]

By |2021-10-22T18:57:40+02:00October 22nd, 2021|Non classé|

THE SOC REVEELIUM OBTAINS THE U.A.F. LABEL

THE SOC REVEELIUM OBTAINS THE U.A.F. LABEL ITrust has obtained the UAF (Used by French Military) label, granted to our Reveelium technology, integrated into our SOC. This label, awarded by the French Ministry of the Army, is the result of several years of collaboration in the protection of vital national organizations. This recognition reinforces ITrust's position as a reference in the market of AI-enhanced sovereign cybersecurity solutions. (SIEM UEBA, XDR, Scanner and EDR) "The Reveelium SOC is the first SOC to receive the UAF label. Three French ministries are now secured by the SOC Reveelium, in order to fight against [...]

By |2021-10-07T15:54:57+02:00October 7th, 2021|Non classé|

The recipe of a good SIEM for a good SOC?

How does Reveelium UEBA / TreatHunting SIEM work? The principles that govern the operation of SIEM (Security Information Event Management) tools have been well known for years. The arrival of artificial intelligence for cybersecurity tools is less well known. We try to explain it simply here, despite the important technical knowledge usually necessary to fully understand the functioning of very innovative AI technologies.   The logical building blocks : A SIM: Security information management: it centralizes and aggregates logs from applications, equipment, security tools (FW, antivirus, proxies, etc...). An advanced SIM can generate some alerts based on (simple) search criteria [...]

By |2021-10-07T15:58:25+02:00October 7th, 2021|Non classé|

Who is the winner? The MITRE Matrix-based ranking of the best cyberprotection technologies

Above : Feedback from the field CIOs, CISOs or managers often ask us what the best practices are to apply to protect themselves effectively and quickly. The first answer I give them is to identify the risks and to set up a simple organization (CISO, DPO, PSSI) adapted to the structure's functioning. Within ITrust for 14 years, we have had the time to form an opinion on the best practices, correlating them to those identified by the ANSSI or ENISA or SANS. We have some convictions and we wanted to confirm them with a mini study based on independent recognized [...]

By |2021-10-07T16:21:12+02:00October 7th, 2021|Non classé|

Our commitment

I would like to share our commitment with you. Who are the entrepreneurs / managers that validate these statements? In these troubled times I asked the #Itrust teams: - to support companies in difficulty even if they lack budget (Free COVID Kit for all) - to participate in the effort to fight the #covid - to try to maintain R&D investments within the group as much as possible (more than 65% of the company's expenses) - to maintain our activities and services at 100%, for our clients - to honour all invoices from our supplier partners on time - to [...]

By |2020-10-30T16:23:16+01:00October 30th, 2020|Non classé|

“Cyber” essential safety precautions

Beyond the safety precautions that we know well and that we accomplish daily  to protect each other’s health, there are some that concern the health of our... companies! I will try to answer many of these companies’ current questions, with factual data, generated from the 350 clients of the company I manage, which specializes in cyber security: ITrust. With data “from the field”.This opinion column may seem naive, but it's sole ambition is mainly to be pedagogical. The unprecedented and brutal economic and social situation, which could be described as tense, to say the least, has created a new risk, [...]

By |2020-10-04T20:57:40+02:00October 4th, 2020|Non classé|
Go to Top