Nicolas Engel

Idea(ls) on cybersecurity

How to secure teleworking?

Cybersecurity within the business world has continued to become more complex with the advent of telework. One of the factors that has facilitated remote work is the move-to-cloud, i.e. the migration (partial or total) of the information system hosted on physical servers administered within the company to dematerialized servers whose outsourcing is done remotely most […]

Windows prototyping and virtualization solutions

A recurring trend in IT security is the overused use of fashionable terms, which do not cover the same reality for the customer or his service provider. SecOps (Security Operations) is the perfect example here. In order to clarify the debates in the professional world, I therefore wanted to use my pentest laboratory prototype to […]

DevSecOps – A bird in the hand is worth two in the bush.

Defensive security has always been less popular than offensive security. Its reactive function against attackers taking the initiative is simply less attractive. The fiction is also not mistaken in showing little hooded geniuses play complex systems with ease while ignoring the players of the opposing team. For there to be a match, there must be […]

How to test your ideas in cybersecurity without falling into illegality?

Unlike the reflections on cybersecurity decorrelated from the field that your author courageously writes in full view of all, putting it into practice is always trickier. In a field where many people pride themselves on their expertise, the demonstration of skills regularly borders on illegality. Certainly there are cybersecurity learning and challenge platforms such as […]

The cyberkill chain in the light of James Bond

Seeing James Bond – Skyfall again allowed me to savor a film, which skilfully mocks Holywoodian clichés. One scene in particular is rich in teaching: Daniel Craig – archetype of the alpha male – is tied up by a Javier Bardem openly playing on his sexual ambiguity. Mentioning homosexuality in a blockbuster destined for the […]

What does a cyberattack look like in 2020?

Hardly a day goes by without another cyberattack hitting the headlines with alarming messages and sensational numbers. Far from an ethical vision to democratize information, cybercriminals target both individuals and large multinationals. In France, February 2021 was marked by two attacks on hospitals via Ramsomware. In this context of a global pandemic, the immorality of […]

How to bypass electronic mass surveillance? (2nd part)

In the first part, I mentioned the impact that electronic mass surveillance could have on individuals. Even if little is known about it, solutions exist to reduce personal exposure to services that profile our uses. The first two pillars on which I have based my data anonymization are the following: Avoiding the use of platforms […]

How to bypass electronic mass surveillance? (1st part)

If electronic surveillance seems to become the norm in our modern societies, it is above all because information is an individual’s primary wealth. Its administrative data allows to define his identity, his patrimony and his professional activity. The data from his social networks or email messaging allow to know more about his tastes, his aspirations […]

Is electronic mass surveillance becoming the norm?

In the summer of 2013, Edward Snowden’s revelations brought to light the existence of electronic mass surveillance in the United States. Beyond the American example, it was the whole of the democracies erected as paragons of virtue in the face of authoritarian regimes that were questioned in their foundation — individual liberties. This event is […]

Why is cybersecurity so fascinating?

Few areas today carry as much mystery and fantasy as cybersecurity. Popularized by works such as Matrix or more recently Mr. Robot, computer security feeds a collective imagination in search of re-enchantment of reality. Man in his quest for omnipotence has never ceased to describe the unspeakable in order to replace the divine with the […]