Protection contre les risques numériques

github leak

Who Lets Access Keys Out?

Who Lets Access Keys Out? Technical data leakage takes on many forms, but often revolves around the publication of passwords or cloud services’ access keys on the internet. Many technical data leakages are not the result of a malicious actor. … Read More

Vue d’ensemble des systèmes Flare

Vue d’ensemble de Flare Systems Téléchargez le PDF

digital risk protection

Webinar Replay: Who is Digital Risk Protection For?

Who Is Digital Risk Protection for? David Hétu, Chief Research Officer at Flare Systems, defined what Digital Risk Protection is and who needs it most. Who is Digital Risk Protection for? The short answer is everyone who stores personal and financial information … Read More

secret leak

How to decrease false positives when scanning for committed secrets

How to decrease false positives when scanning for committed secrets In 2019, some 10 million developers joined Github and contributed over 44 million repositories in that year alone. Github is the most popular code repository, with 80% of its users … Read More

secret leak

How Do Company Secrets Get Leaked Online?

How Do Company Secrets Get Leaked Online? Back in 2017, Facebook suffered a source code leak, initially believed to have been the result of either a developer intentionally leaking it or a security loophole in company servers. The source code … Read More

How Much Would a Technical Leak Cost You in Stolen Cloud Resources?

How Much Would a Technical Leak Cost You in Stolen Cloud Resources? If you have ever wondered how cryptocurrencies like bitcoin or monero issue  new currency, the answer is through a competition called cryptocurrency mining. This competition is open to … Read More

Docker Hub

How Sudden Policy Changes Put Company Secrets at Risk

How Sudden Policy Changes Put Company Secrets at Risk Popular among developers, Docker Hub has been used for years to share applications and code libraries. In August 2020, Docker reported its service was used by more than 6.5 million developers … Read More

ransomware report

How Ransomware Groups Enhance Their Tactics with Double Extortion and Third-Party Targeting

How Ransomware Groups Enhance Their Tactics with Double Extortion and Third-Party Targeting Protect your digital assets and infrastructure not only by following basic security guidelines, but also by understanding the threat landscape. Download this threat intelligence report to learn about … Read More

Technical Leakage

What is technical leakage and how does it happen?

What is technical leakage and how does it happen? In July, more than 50 international companies suffered a source code leak due to software development misconfigurations in DevOps applications, Bleeping Computer writes. The businesses operated in various industries, including technology, … Read More

digital risk protection

What Does Coverage Mean for Digital Risks?

What Does Coverage Mean for Digital Risks? Digital risk protection (DRP) refers to the “proactive defense of business assets against the threats they face.” This definition starts off with the notion of proactive defense which translates to concrete actions taken … Read More