seela logo

Cybersecurity news

Welcome to the Seela blog. Get unlimited access to all the latest news on the cybersecurity ecosystem, written by our industry experts.
illustration true false positive or negative

True / false positive or negative

In this lesson we will try to sort out the real from the fake... remember that when a negative event occurs, always stay positive!

We will introduce four elements that allow us to classify events.

This vocabulary will allow us to be better understood when we have to qualify an incident or analyze a vulnerability for example.

Read more "
illustration of concepts in cybersecurity methodology and certification

Concepts in methodology and certification

Let's remember the main objective of cyber security, which could be defined as: protecting the company's business and data.

We can say that this objective has no definite end in time, so we must work in an iterative and agile way.

Read more "
illustration of vulnerability, threat and risk in cybersecurity

Vulnerability, threat and risk in cybersecurity

It is obvious to say that you can defend yourself better when you know your weaknesses. The same is true when you know your opponents.

This lesson will allow us to better understand the concepts of vulnerability, threat and risk.

These concepts are essential foundations for implementing vulnerability management and risk management processes.

Read more "
illustration iam aaa

What is IAM / AAA?

In this lesson we will discuss several fundamental aspects of cyber security, grouped under several names, or frameworks.

These are the principles of IAM (Identity and Access Management) or otherwise called AAA (Authentication, Authorization and Accounting).

Read more "
illustration dic tn cybersecurity

What is the DIC / TN?

Data, in the computer world, is information that can be stored or processed digitally.

One of the main objectives of cyber security is to protect the data of the company or an individual.

In this lesson, we will study the criteria for classifying this data in order to put in place adequate protection solutions.

Read more "