Photo de couverture de Orange Cyberdefense
Orange Cyberdefense

Orange Cyberdefense

Services et conseil en informatique

Nanterre, Paris 233 804 abonnés

À propos

Notre mission: construire une société numérique plus sûre. L’une de nos valeurs fondamentales est la confiance, et notamment en l’avenir. Internet doit rester un lieu de création de liens et de progrès. C’est ce monde numérique que nous protégeons. Sa sécurisation est portée par tout un écosystème dont nous sommes aujourd’hui au cœur. Notre approche: protéger vos essentiels Orange Cyberdefense accompagne les entreprises dans la sécurisation de leurs activités et de leurs données. Nous apportons à nos clients une protection sur tout le cycle de vie de la menace.

Site web
https://orangecyberdefense.com
Secteur
Services et conseil en informatique
Taille de l’entreprise
1 001-5 000 employés
Siège social
Nanterre, Paris
Type
Société cotée en bourse
Domaines
Managed Security Services, Managed Detection and Response, Cloud Security, Security Awareness, Security Training, Identity and Access Management, Infrastructure Security, Ethical Hacking, Data-centric Security, SASE, OT Security et Industrial Systems Security

Lieux

Employés chez Orange Cyberdefense

Nouvelles

  • Orange Cyberdefense a republié ceci

    We made a huge investment this year into this report on the state of cybersecurity in Africa, collecting, organising and analysing data over the last five years. It was an act of passion for me. As a South African I loved having the chance to be curious about my home continent, to read the stories, study the numbers - to really think about what we're seeing, and what we can deduce from that. With the support dozens of colleagues from the continent, as well as an amazing international team, I think we've produced a report that can make a real contribution to our collective understanding of cyber security on the continent. Like many sincere efforts at authentic research, the report raises as many questions as it answers, but I'm still proud of the effort and confident that it will have something to give to _anyone_ who reads it. So, if you're in the cybersecurity space, in Africa or elsewhere on the globe, take an hour to have a look, share, and let us know what you think! p.s. Also available in French! Links in the comments below. #cybersecurity #africa #G20 #research

  • Voir la Page de l’organisation de Orange Cyberdefense

    233 804  abonnés

    🚀 Security Navigator 2026 is coming soon (4th December)! Pre-order your copy today to receive it 24 hours ahead of the launch: 💡 Packed with expert insights, strategies, and analysis to help you navigate the cybersecurity landscape. Don’t miss your chance to get it first! 📘 👉 Click here and get your copy ahead of time: https://ow.ly/ozJu50Xn2Rz #Cybersecurity #SecurityNavigator #PreOrder #CTI #Threatintelligence

    • Aucune description alternative pour cette image
  • Voir la Page de l’organisation de Orange Cyberdefense

    233 804  abonnés

    Vi er stolte av å dele at Orange Cyberdefense har blitt utnevnt til en «Representative Vendor» i Gartners Market Guide for Digital Forensics og Incident Response Retainer Services, publisert 23. juli 2025. Denne anerkjennelsen styrker vårt engasjement for å hjelpe organisasjoner med å respondere raskt og effektivt på cyberhendelser. 💪 👉 Les mer her: https://ow.ly/e9xN50WBj97 #CyberSecurity #DigitalForensics #IncidentResponse #Gartner #MarketRecognition

    • Aucune description alternative pour cette image
  • Voir la Page de l’organisation de Orange Cyberdefense

    233 804  abonnés

    Orange Cyberdefense Switzerland freut sich, die Übernahme der ensec AG bekannt zu geben, einem renommierten Schweizer Unternehmen für Cybersicherheit mit Sitz in Zürich. 🔸 Ensec ist bekannt für seine fundierte Expertise in den Bereichen Beratung, Integration von IT-Sicherheitslösungen und Managed Security Services. 🔸 Durch diesen Zusammenschluss wächst unser Team auf 140 hochqualifizierte Spezialistinnen und Spezialisten, wodurch wir unsere technologische Kompetenz weiter ausbauen und unsere Kunden in allen sicherheitskritischen Bereichen noch gezielter unterstützen können. 🔸 Mit dieser Übernahme bauen wir unsere Präsenz in der Deutschschweiz weiter aus und ergänzen hiermit unsere bereits etablierte position im Schweizer Markt. 🤝 Wir heissen unsere neuen Kolleginnen und Kollegen herzlich willkommen und freuen uns darauf, gemeinsam mit ihnen die digitale Sicherheit unserer Kunden auf ein neues Level zu heben. [Pressemitteilung]: https://ow.ly/ZiM550Wus03 🧡🧡🧡 Orange Cyberdefense Switzerland est fier d'annoncer l'acquisition de la société ensec AG, spécialiste suisse de la cybersécurité basé à Zürich. 🔸 Ensec est une entreprise locale reconnue pour son expertise en conseil, intégration de la sécurité informatique et services de sécurité managés. 🔸Grâce à cette acquisition, nous comptons désormais 140 experts, ce qui nous permet de renforcer notre expertise et d’accompagner efficacement nos clients dans tous les secteurs critiques. 🔸 Cette étape nous permet de poursuivre l'expansion de notre présence en Suisse alémanique, complétant ainsi notre position déjà établie sur le marché suisse. 🤝 Nous souhaitons la bienvenue à nos nouveaux collègues et sommes ravis de les compter parmi nous pour continuer à renforcer la sécurité de nos clients ! [Communiqué de presse] : https://ow.ly/AuKE50Wus02 Orange | Mike Schuler | Nicolas Lutz | Hugues Foulon | Christel Heydemann | Laurent Martinez | Vincent Lecerf | Aliette Mousnier-Lompré | Adela Guédon | Paz Fonteboa | Laurent Celerier | Olivier de Paillerets | Frederic Zink | Quentin Toussaint | Kaja Narum | Geoffroy Sirven-Vienot #ENSEC #SaferDigitalSociety #Leadthefuture #Switzerland #Cybersecurity

    • Aucune description alternative pour cette image
  • Voir la Page de l’organisation de Orange Cyberdefense

    233 804  abonnés

    🎤 Hacking Swiss Companies in 2025 - Results from the Field We’re proud to announce that Sergio Alves Domingues, CTO at Orange Cyberdefense Switzerland, will be speaking at the Richmond Cybersecurity Forum 2025 with Richmond Events Switzerland. Drawing insights from over 450 penetration tests conducted across Switzerland, Sergio will share a deep dive into the most exploited weaknesses in Swiss companies today and how to prevent them. From real-world trends to hands-on remediation tactics, this talk is not to be missed. 📍 See you at the Richmond Cybersecurity Forum 2025 🗓️ September 23 to 24, 2025 - Davos #RichmondCybersecurityForum #Pentest #Ethicalhacking #Switzerland

    • Aucune description alternative pour cette image
  • Voir la Page de l’organisation de Orange Cyberdefense

    233 804  abonnés

    Nous sommes ravis d’avoir Veeam à nos côtés en tant que Gold Sponsor à Reboot 2025 ! Merci à Jennifer Guinchard, Christian Bocquet et Karin Szedlak pour leur participation à l’avenir de la cybersécurité et de l’infrastructure. 📅 16 septembre 2025 📍 Crissier, Suisse 🚀 Inscription gratuite : https://ow.ly/PgUw50W4fEP #Cybersecurity #Infrastructure #TechEvents #Networking #Innovation #Reboot2025 #Sponsor

    • Aucune description alternative pour cette image
  • Voir la Page de l’organisation de Orange Cyberdefense

    233 804  abonnés

    We often see “OT attack” used as a catch-all label.👀 Ric Derbyshire breaks that down into something far more useful, helping analysts, engineers, and decision-makers make sense of real-world incidents. 👇Dive into the subject

    Voir le profil de Ric Derbyshire

    Principal Security Researcher | OT & Critical Infrastructure

    A few years ago, we began cataloguing publicly reported OT-impacting cyber attacks to build an OT-specific dataset. We ran into a recurring problem: many incidents were grouped under "OT attacks", but they weren’t equivalent. Some involved adversaries that never reached OT environments but still caused effects, often through impacts on IT systems or dependencies. Others touched OT systems without meaning to. And a small number were deliberate, precise, and clearly OT-focused. Splitting them into IT and OT attacks alone was too simplistic. OT environments contain a lot of traditional IT assets like engineering workstations, patch management servers, even file shares. So when an adversary targets those, what kind of attack is it? Existing frameworks like MITRE ATT&CK (Enterprise and ICS), the ICS Kill Chain, and the Cyber-physical Attack Lifecycle are excellent. We use them regularly. However, they fundamentally answer a different question than the one we were asking. Our challenge wasn't mapping behaviours or sequencing attack stages. It was describing the nature of the attack: the overall techniques used, the intent, and the context. So we built our own taxonomy. To support it, we used the Purdue Model, not as a prescriptive architecture, but as a reference point and common language for asset locations within an environment. We defined two overarching categories, each containing underlying 'types' to better capture the nuance of real-world attacks: 𝗖𝗮𝘁𝗲𝗴𝗼𝗿𝘆 𝟭: 🖥️ Attacks that use exclusively IT TTPs • 1a: The adversary never reaches OT. Impact cascades from disruption of dependencies in IT. OT may even be disconnected or shutdown driven by an abundance of caution or lack of confidence in security controls. • 1b: The adversary reaches OT by accident or opportunistically. Traditional IT assets in the OT are touched, but the TTPs used remain purely IT-focused. • 1c: The adversary deliberately targets traditional IT assets in OT. The OT is the target, but IT TTPs are still used. 𝗖𝗮𝘁𝗲𝗴𝗼𝗿𝘆 𝟮: ⚙️ Attacks that include the use of OT TTPs • 2a: Crude OT attacks using basic tools or frameworks. Examples include CPU STOP commands or brute-forcing HMI credentials. These tend to be noisy, overt, and imprecise. • 2b: Higher-capability attacks involving process comprehension. The adversary understands how OT interacts with physical processes and crafts meaningful impacts accordingly. This taxonomy helped us structure the dataset more clearly and analyse adversary targeting, intent, and impact with greater precision. Next week, I’ll start sharing some findings and related visualisations from the dataset. If there are particular aspects you'd like to explore, let me know. --- Visuals below 👇 𝗣𝘂𝗿𝗱𝘂𝗲 𝗠𝗼𝗱𝗲𝗹 𝗧𝗮𝘅𝗼𝗻𝗼𝗺𝘆 #CyberSecurity #OTsecurity #ICSsecurity

    • Diagram of the Purdue Enterprise Reference Architecture (Purdue Model), showing levels 0 to 5, with operational technology and enterprise zones separated by a DMZ.
    • Table depicting the taxonomy described in the post, categorising OT-impacting cyber attacks into two categories: IT TTPs and OT TTPs, each with underlying types based on targeting and sophistication.
  • Orange Cyberdefense a republié ceci

    Voir la Page de l’organisation de Orange Cyberdefense

    233 804  abonnés

    🌍 From Italy to France - and 12 more countries in between - Camilla Mazzitti is helping us build a safer digital society! 💡✨ With her unstoppable energy, she ensures our offers and solutions shine worldwide. 💬 Her message to women considering a career in cybersecurity? "Go for it!"🚀 Ready to make your mark? Join us: 👉Check out our vacancies: https://ow.ly/Zpyh50Vsatb #WomenInTech #NoBiasInCyber #SaferDigitalSociety

  • Voir la Page de l’organisation de Orange Cyberdefense

    233 804  abonnés

    𝗦𝗽𝗼𝗲𝗱𝗺𝗲𝗹𝗱𝗶𝗻𝗴! 𝗘𝗲𝗻 𝗱𝗶𝗴𝗶𝘁𝗮𝗹𝗲 𝗰𝗿𝗶𝘀𝗶𝘀 𝘁𝗿𝗲𝗳𝘁 𝗷𝗼𝘂𝘄 𝗼𝗿𝗴𝗮𝗻𝗶𝘀𝗮𝘁𝗶𝗲. 𝗪𝗮𝘁 𝗱𝗼𝗲 𝗷𝗲 𝗱𝗮𝗻? Op 8, 9 en 10 april verzorgt onze strategic advisor Jort Kollerie tijdens Zorg & ict zijn keynote "Cybercrisis: Voorkomen is beter dan genezen" Jort vergelijkt hierin de digitale wereld met de spoedeisende hulp en ziet dat er verrassend veel parallellen te trekken zijn. Wat leer je? - Hoe je jouw zorginstelling cyberfit houdt - Wat de grote dreigingen van morgen zijn - Hoe mensen, processen en techniek net als in de zorg onlosmakelijk verbonden zijn in cybersecurity - Hoe je met beperkte middelen maximale impact maakt 🎭 Theater 7 | Dagelijks 14:30 - 15:00 🔹 Zorg dat je erbij bent en meld je nu gratis aan als bezoeker: https://ow.ly/XkCk50VnUQ3

    • Aucune description alternative pour cette image

Pages affiliées

Pages similaires

Parcourir les offres d’emploi