Identifiez-vous pour voir le profil complet de Victor
Bon retour parmi nous
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
ou
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Identifiez-vous pour voir le profil complet de Victor
Bon retour parmi nous
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
ou
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Paris, Île-de-France, France
Identifiez-vous pour voir le profil complet de Victor
Bon retour parmi nous
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
ou
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
13 k abonnés
+ de 500 relations
Identifiez-vous pour voir le profil complet de Victor
Bon retour parmi nous
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
ou
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Voir les relations en commun avec Victor
Bon retour parmi nous
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
ou
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Voir les relations en commun avec Victor
Bon retour parmi nous
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
ou
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Identifiez-vous pour voir le profil complet de Victor
Bon retour parmi nous
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
ou
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
À propos
Bon retour parmi nous
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
Articles de Victor
-
BYOD & Secure Access: Maximizing Productivity Without Compromising Security
BYOD & Secure Access: Maximizing Productivity Without Compromising Security
(This is the second article in the series "From Legacy to Innovation: The Smart Move to Secure Browsing." If you missed…
49
2 commentaires -
Beyond VDI: Rethinking Secure Access in the Cloud Era5 févr. 2025
Beyond VDI: Rethinking Secure Access in the Cloud Era
For years, Virtual Desktop Infrastructure (VDI) has been the go-to solution for delivering secure remote access to…
99
-
Three ZTNA 2.0 Starting Points for Your Organization1 sept. 2022
Three ZTNA 2.0 Starting Points for Your Organization
Getting started with ZTNA 2.0 should not be difficult, overwhelming, or come with compromises.
13
Activité
13 k abonnés
-
Victor Desteucq a partagé ceci🌊 Ride the wave — before it rides you: Security is moving to the browser. We’re hiring builders, evangelists, and game changers to lead one of the most disruptive shifts in cybersecurity: ➡️ From networks to users ➡️ From endpoints to browsers ➡️ From fragmented tools to secure, unified experiences 🔎 We’re looking for Enterprise Browser Sales Specialists 📍 Locations: 🇧🇷 Brazil | 🇫🇷 France | 🇬🇧 UK | 🇪🇸 Spain | 🇮🇱 Israel 💥 Product: Prisma Access Browser (PAB) — the browser-based platform trusted by global leaders to enable secure, frictionless work on any device, anywhere. 💬 DM me if you’re ready to: -Lead 6–7 figure browser-only deals -Replace legacy web proxies, VDI, and VPNs -Combine user experience and security in one elegant move -Join a rocket ship with massive exec support The future of security is already here. It just looks like a browser — but a secure browser. Marcos Pupo, Etienne Bonhomme, Alistair Wildman, Jordi Botifoll, Dudi Ilan, John Maynard, Ofer Ben-Noon, Reuven Eliyahu, Chris Gaba, Maha Hachem Siriex, 🐡 Mischa Peters
-
Victor Desteucq a partagé ceci🔊 RSA Conference 2025 is in full swing… and one topic is dominating every conversation: the Secure Enterprise Browser. Across every industry, every region, and every kind of IT setup — from lean teams to complex global infrastructures — the interest is universal. 👥 Back-to-back meetings, nonstop demos, POC requests flooding in — the momentum is real. And here’s what the industry is saying: 👉“Secure enterprise browsers represent a compelling solution to consolidate security controls while improving user experience”, Gartner 👉“There’s a significant uptick in phishing, fraud and identity-based attacks occurring within the browser itself”, Information Security Media Group (ISMG) - https://lnkd.in/ePk8Jzwf 👉“Palo Alto Networks is bringing enterprise-grade protection directly into the browser, giving organizations a new level of control over AI usage, data exfiltration and user behavior — without adding friction”, CRN 👉“Consumer browsers were not designed for enterprise use or the challenging environments in which we now run them. If attackers take over a browser, then pretty much they have access to all our data”, Ofer Ben-Noon 🙏 Huge thanks to our customers for their trust and feedback — and to everyone showing strong interest in PAB. Curious why everyone’s talking about it? 💻 Try it for yourself: no architecture changes, silent deployment… and full visibility & control in just minutes. Elad Gavra, Glenn M., Justin Kapahi, Chris Gaba, Shlomi Zrahia, Guy Harpak - https://lnkd.in/emw6kdzp
-
Victor Desteucq a partagé ceci😁 We’re expanding! At Palo Alto Networks, we’re scaling the Secure Enterprise Browser (a.k.a. PAB) team globally 🌍 — because cybersecurity has no borders. We’re looking for people who know how to: 🔹Engage and connect with decision makers, 🔹Drive impactful conversations around innovation and cybersecurity, 🔹Present a disruptive solution simply and effectively, 🔹Create momentum and turn opportunities into real wins. If you have the energy, the passion, and the ambition to help solve today’s critical cybersecurity challenges, reach out now! Big things are happening — come be part of it! Ofer Ben-Noon, Reuven Eliyahu, Chris Gaba, Maha Hachem Siriex, John Maynard, Jae Won Lee
-
Victor Desteucq a partagé ceciIn many parts of the world, users operate in areas with limited or no access to traditional SASE infrastructure — unstable connectivity, high latency, or simply no nearby POPs. Prisma Access Browser (PAB) changes the game. With security built directly into the browser, users are protected wherever they are — no need to backhaul traffic, no reliance on POPs, and without decrypting SSL traffic. 👉 Because PAB enforces policies natively at the browser level, it applies security controls to all web traffic — encrypted or not — without ever needing to intercept or decrypt it. That means: -Less complexity -No performance impact -And no compromise on user privacy 💡 The result? -A seamless user experience -Faster access -Higher productivity -And enterprise-grade protection — anywhere Whether it’s remote sites, isolated locations, or underserved regions, PAB delivers Zero Trust security at the true edge — where the user is. Because real innovation means being secure by design — not bolted on afterward. 👉 Give us 30 minutes and we’ll show you how PAB works — with its exclusive advantages, zero infrastructure changes, and a simple, effective POC that proves immediate ROI. https://lnkd.in/eYQkbrby
-
Victor Desteucq a partagé ceciPrisma Access Browser is working. Really well. Customers love it. The value is clear. The momentum is real. Now we’re looking for a Sales Specialist in JAPAC to help take it even further — to scale the success, grow adoption, and bring this innovation to even more organizations. If you love selling a product that delivers immediate impact and solves real problems, this is for you. Apply now: https://lnkd.in/eSnuH5Am Make the right Sunday click — it might just change your career.
-
Victor Desteucq a partagé ceciThe public sector is facing new digital challenges. With the rise of BYOD, increasing demand for secure remote access, growing use of generative AI, and ongoing budget constraints, public institutions are under pressure to deliver agility, resilience, and cybersecurity — all at once. What if the answer lies in a secure enterprise browser? Prisma Access Browser (PAB) by Palo Alto Networks enables: -Isolated, secure web access on unmanaged devices (for government staff, contractors, elected officials…), -Simplified IT infrastructure, without the cost and complexity of traditional VDI, -Data protection and compliance, without disrupting user workflows, -And rapid deployment, fully integrated into your existing environment within hours. Whether you're a central administration, a local authority, or a public healthcare institution, PAB can help modernize access and strengthen your security posture. Happy to connect and walk you through real-life use cases and current projects within the public sector. Oded Aharon, Mike Bussmann, Jonas Anemiche, Charles GENGEMBRE, Milos Hrncar, Satpal Biant, Norberto (Bert) Milan, Jordi Botifoll, Estefania Rodriguez, Benjamin Römhild, Maha Hachem Siriex, John Maynard, Javier Alonso...
-
Victor Desteucq a partagé ceciTwo weeks ago, I kicked off a series exploring the biggest challenges in secure access and data protection—and how Secure Enterprise Browsing provides a smarter alternative to legacy solutions. After discussing VDI alternatives (https://lnkd.in/eqenqYtR), it's time to tackle another critical issue: BYOD security. Employees, contractors, and third-party partners increasingly work from personal devices, pushing traditional security models to their limits. But how do you enable flexible access without exposing sensitive data? Here’s what’s coming in the series: 1️⃣ Beyond VDI: Rethinking Secure Access in the Cloud Era (📖 Read here: https://lnkd.in/eqenqYtR) 2️⃣ BYOD & Secure Access (New!) 3️⃣ Third-Party & Contractor Security Risks 4️⃣ Preventing Data Leaks Before They Happen 5️⃣ The SaaS Security Gap 6️⃣ Hybrid Work & The End of VPNs 7️⃣ AI-Powered Threat Prevention 8️⃣ How to Transition to Secure Browsing 📖 This week: BYOD & Secure Access 👉 Read here: [Insert Article Link] How is your organization securing BYOD access without creating friction for users? Let’s discuss!BYOD & Secure Access: Maximizing Productivity Without Compromising SecurityBYOD & Secure Access: Maximizing Productivity Without Compromising SecurityVictor Desteucq
-
Victor Desteucq a partagé ceciOver the coming weeks, I’ll explore key challenges in secure access and data protection, and how Secure Enterprise Browsing provides a smarter approach. Here’s what’s coming: 1️⃣ Beyond VDI: Rethinking Secure Access in the Cloud Era 2️⃣ BYOD & Secure Access 3️⃣ Third-Party & Contractor Security Risks 4️⃣ Preventing Data Leaks Before They Happen 5️⃣ The SaaS Security Gap 6️⃣ Hybrid Work & The End of VPNs 7️⃣ AI-Powered Threat Prevention 8️⃣ How to Transition to Secure Browsing 📖 First up: Beyond VDI—Rethinking Secure Access in the Cloud Era 👉 Read here! How are you tackling secure access and protecting data in a cloud-first world? Let’s discuss!Beyond VDI: Rethinking Secure Access in the Cloud EraBeyond VDI: Rethinking Secure Access in the Cloud EraVictor Desteucq
-
Victor Desteucq a partagé ceci🇬🇧Exciting Update for the UK: Prisma Access Browser (PAB) now fully supports data residency and control plane requirements in the UK! 🎉 🤔 What does this mean for UK businesses? PAB enables organizations to securely manage both managed and unmanaged devices, enhancing productivity while ensuring robust data protection. With this latest enhancement, PAB meets the specific needs of UK organizations that require local compliance and greater control over their data. 😉 Why consider PAB now? -Solve BYOD and remote work challenges with ease -Replace or complement VDI environments for better scalability -Secure sensitive data without disrupting existing infrastructure -Support for Undecryptable Traffic to maintain visibility and control -Business Continuity Plan: Ensure seamless operations and access during disruptions 👉 This is the perfect opportunity to take a closer look at what PAB can bring to your organization. It’s already helping businesses worldwide redefine productivity and security—now tailored specifically for the UK. Let’s connect to discuss how PAB can fit your needs and transform your business! Jonas Anemiche, Steve McCarthy, Marco Vadrucci, Simon Addis, Spencer Branton, Danail Taskov, Angel Angelov, Adam Start, Henry Batten, Jamie Brown
-
Victor Desteucq a réagi à ceciVictor Desteucq a réagi à ceci𝗥𝗲𝘁𝗼𝘂𝗿 𝗲𝗻 𝗶𝗺𝗮𝗴𝗲𝘀 📸 MIEL 𝗮 𝟰𝟬 𝗮𝗻𝘀 ! Début novembre, la ruche s’est réunie pour 𝘂𝗻 𝗞𝗶𝗰𝗸 𝗢𝗳𝗳 mémorable 🎂 Un week-end pour célébrer 𝗹𝗲 𝗰𝗵𝗲𝗺𝗶𝗻 𝗽𝗮𝗿𝗰𝗼𝘂𝗿𝘂 et partager 𝗱𝗲𝘀 𝗺𝗼𝗺𝗲𝗻𝘁𝘀 𝗰𝗵𝗮𝗹𝗲𝘂𝗿𝗲𝘂𝘅 ☀️ Quatre décennies d’aventure, c’est : 💡 Des technologies innovantes 🤝 Des partenaires et éditeurs fidèles 🐝 Une équipe engagée et passionnée Merci à toutes celles et ceux qui font vivre Miel chaque jour 🩵 40 ans déjà… 𝗲𝘁 𝗹’𝗮𝘃𝗲𝗻𝘁𝘂𝗿𝗲 𝗰𝗼𝗻𝘁𝗶𝗻𝘂𝗲 🚀
-
Victor Desteucq a réagi à ceciVictor Desteucq a réagi à ceci🚨 New Mission Unlocked: The Adventure Continues! 🚀 After almost 10 years of a rich and exciting experience at Palo Alto Networks, the time has come to turn the page and open a new chapter! 👋 A huge thank you to all the incredible clients and teams I had the chance to collaborate with on strategic cybersecurity projects! I leave with immense gratitude and three strong convictions forged over this decade: 🎯Cyber is a strategic imperative : Far beyond a technical topic, security is a pillar of business growth and longevity for enterprise ✨ A major vector for innovation: Cyber is the driving force that allows organizations to innovate and adopt new technologies with confidence. 🤝The human dimension is paramount : Building trust and guiding teams through change remains the cornerstone of any successful security transformation. Special mention to my former colleagues Mickael Chantalou Bruno Riou Nicolas Warnier Guillaume Letourneur Etienne Bonhomme Jerome Viguerie Thomas GUERIN and so many more talented people I've crossed along this journey ⛅ Today, I am super excited to announce I am joining Cloudflare as a Senior Account Executive! ☁️Joining Cloudflare is the opportunity to continue tackling exciting challenges, helping to build a faster, safer, and more reliable Internet for everyone. I look forward to bringing my experience and expertise to this mission and discussing with you the solutions that are redefining security challenges. Thanks for this opportunity Rémi Durand-Gasselin Bruno CAILLE Anna Wolf Hugo Delmas 🌐 Let's connect and let's accelerate digital transformation with complete security! Cloudflare Palo Alto Networks #newjob
-
Victor Desteucq a réagi à ceciYour smiles, Ali Bouzidi , Sylvain Journet , Sylvain Goze and Christophe Lopez-Castel say everything about the atmosphere at our Cato Xperience Day yesterday in Paris! It was such a pleasure to reconnect, together with our long-time Ditributor NEOVAD and all the partners who contribute to Cato Networks’ success in France. I’m also extremely proud of the quality of the presentations, engagement, and discussions throughout this fantastic day. Thank you to all our partners for showing up in force, I can’t wait for 2026 to celebrate all our recent and upcoming successes together! Go Cato Networks ! Karl Soderlund | Nick Fan | Joel Mollo | Adrien Porcheron | Sylvain CHAREYRE | Joseph FERNANDO | Victor Desteucq | Alon AlterVictor Desteucq a réagi à ceci✨ C’est le grand jour ! l'Xperience Day by Cato Networks! Notre événement annuel partenaires se tient aujourd’hui : l’occasion de partager notre vision, renforcer nos collaborations et dévoiler nos prochaines innovations. Merci à tous nos partenaires pour leur confiance. Hâte de vivre cette journée riche en échanges ! #Partenaires #Événement #Innovation #Collaboration#SASE#Cato Networks Nicolas Warnier Joel Mollo Adrien Porcheron Christophe Lopez-Castel Sylvain Journet Sylvain Goze Marion Denuncq Sylvain CHAREYRE Joseph FERNANDO Mark Draper NeoVAD
-
Victor Desteucq a réagi à ceciVictor Desteucq a réagi à ceciFar from the shore 🌊 no cellphones around 📵 just incredible people talking. 🗣️💬 It has been my first unusual event to meet people from the cyber industry, not in closed office, not in fancy conference hall, not under air conditioners and not in business towers, but in the middle of the sea. Great place to authentically meet people and get to know each other, as who they are without background noise and suits, as we Israeli really do and love. I wanna thank CyberCruise and Idan Wiener for organizing this event, and to the guys from KAVADEV for sponsoring this incredible event. Until next time!
-
Victor Desteucq a aimé ceciHonored to have recently spent time with a great visionary leader John Chambers at his home. It brought back memories of our 20 years working together at #Cisco. John took Cisco from a relatively small player with 400 employees and $70 million in revenue to the world’s most valuable company by market cap in 2000, establishing it as the global IT & Networking leader that helped shape and accelerate the worldwide digitization and Internet era. I’ve always learned from the lessons in John’s Book "Connecting the Dots": • Spot transitions early and commit — lead the market by leaning into the next wave before it’s obvious. • Obsess over customers — let their toughest problems shape priorities, product, and roadmaps. • Choose speed over perfection — ship, learn, iterate; perfection delays impact. • Scale with repeatable playbooks — turn one win into many through process, metrics and accountability. • Build ecosystems combine build/buy/partner to accelerate innovation and reach. • Integrate M&A with discipline, value culture, customers and technology. • Culture and resilience — hire for curiosity, coach through setbacks, and treat mistakes as tuition. • Connect tech to purpose — innovation matters most when it advances people, communities, and society. Today, as Founder & CEO of #JC2Ventures, John is scaling early-stage innovators in security, AI, next-gen infrastructure, and sustainability — with a portfolio of 24 startups - with 3 IPOs, 4 acquisitions, 10 Unicorns, 2 Decacorns — while nurturing ecosystems across the U.S., France, Germany, and India. John’s 2025 predictions, many of which have already occurred: • AI drives markets; IPOs pick up in H2 and M&A heats up. • ≥7-10% productivity lift from AI across industries. • U.S. and India lead tech/AI; India has a breakout year. • Tech transitions run 5× faster with 3× the impact; transformation cycles compress to 1–3 years. • Leaders that don’t adapt risk displacement; expect job disruption without rapid upskilling. • Quantum remains longer-term; AI is the defining technology of the decade. • Cybersecurity spending will pick up dramatically • 2025 will be the year AI delivers substantive results across industries As for me, I’m proud to serve as VP at #PaloAltoNetworks — the world’s largest #cybersecurity company — delivering AI-led multi-platform security with autonomous, real-time protection across: • Network Security & SASE: Zero Trust segmentation + secure access from users/branches/DC to cloud & OT with one unified policy plane. • SOC & Threat Ops: Unified telemetry + AI/automation to cut noise, speed investigations, and auto-respond. • Cloud-Native Security: Posture + workload/app/API protection across multi-cloud. • Identity Security: Least privilege with continuous risk scoring for humans, machines, and AI agents. • Autonomous Controls: Policy-as-code + real-time remediation to reduce TCO and boost resilience #netapp Helmut Reisinger Cesar Cernuda Shannon Weich Pina
-
Victor Desteucq a réagi à ceciVictor Desteucq a réagi à ceci🇬🇧 🇫🇷 Prochain invité d’honneur à #Londres : ‼️ Un témoignage édifiant ‼️ Août 2021. À Kaboul, les Talibans reprennent le pouvoir. Dans l’ambassade de France, un homme et son équipe prennent une décision historique : ouvrir les portes à des centaines de réfugiés, protéger, évacuer, tenir. Une évacuation de nuit s’organise dans l’urgence, suivie d’un attentat qui frappera l’aéroport . Cet homme, c’est David Martinon, alors ambassadeur de France en Afghanistan. Son témoignage a inspiré le documentaire bouleversant « Kaboul Chaos ». ▪️ L'avoir à notre table est un véritable honneur 🙏 Ancien porte-parole de la Présidence de la République, aujourd’hui ambassadeur en Afrique du Sud, David Martinon incarne un leadership lucide et courageux face à l’imprévisible. Le mardi 2 décembre à Londres, il partagera avec la communauté de The French Catalyst un témoignage exceptionnel sur la prise de décision en situation extrême, le sens du devoir, et le rôle de la France dans un monde en recomposition. Ca sera au Royal Automobile Club de Londres (lien en commentaire)
-
Victor Desteucq a aimé ceciVictor Desteucq a aimé ceci⚡ AI will rock you ⚡ 🚀 So proud, so excited! Next Monday we launch #GenAI Week at Forvis Mazars Group! Thanks to an amazing team of Transformation Catalysts (Jeroen Hofland, Fay Bordbar, Shaun Vorster, Jean-François (Jeff) WANG), we’re paving the way for a future where generative AI isn’t just a tool—it’s a game-changer for how we work and think. 🔥 Already 6500+ colleagues have onboarded globally… that’s extraordinary! It shows we’re tackling the right topics, in the right way. 👉 What’s coming? Hands-on sessions Expert panels Inspiring initiatives + Guest speakers ready to challenge us! GenAI Week is about exploring, experimenting, engaging. Because the future isn’t something we wait for—it’s something we build. 📌 Stay tuned… and for our Forvis Mazars colleagues: sign up, we can’t wait to see you there! Robbie White | Sylvain Freon | Gregory Volpi | Romain Magnin | Kathy Vermeulen | Daniel W. | Cilia C. Kanellopoulos | Bermet Usenova | Edward Van Lint | Mila Potzkova | Jack Blakemore| Guilhem Lecoyer | Lorraine Hackett | Marie L.
Expérience et formation
-
Palo Alto Networks
*** ***** ****** ********** ******* ********* ***** * *****
-
********
******** ***** ******** ********** * ****** ******
-
*****
***** * ******* ********
-
********* ********** ** **********
****** ** ******* ***** * ******** *** ********** undefined undefined
-
-
******* ************* **********
****** ** ******* ***** * ************* ********** undefined
-
Voir toute l’expérience de Victor
Découvrez son poste, son ancienneté et plus encore.
Bon retour parmi nous
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
ou
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Langues
-
Anglais
Capacité professionnelle complète
-
Français
Bilingue ou langue natale
Voir le profil complet de Victor
-
Découvrir vos relations en commun
-
Être mis en relation
-
Contacter Victor directement
Autres profils similaires
Découvrir plus de posts
-
Todd Carroll
CybelAngel
2025 will be a defining year for external threat intelligence. Having observed trends with CybelAngel for the past year, I’ve noticed: ☑️ Ransomware threats are on the up: CybelAngel detected a 42% rise in reported attacks. ☑️ AI is fueling cyber attacks: Since ChatGPT’s arrival, phishing emails have increased by 1,265%. ☑️ API exposure is rising: We’ve seen a 625% increase in API exposure losses since 2021. ☑️ APT groups are mobilizing: Nation-state sponsored threat actors are more active and creative than ever. In our 2025 report, I have unpacked key insights into cyber threats for 2025, along with best practices and recommendations for #CISOs to fight back. Read it here: https://bit.ly/3WSrXwW
53
2 commentaires -
Shubham Mittal
RedHunt Labs
At VULNCON, I had the opportunity to moderate a panel discussion on “Security Left, Right, and Center: How Modern Security Teams Bake It In”. We tried to keep it practical, to the point, and rooted in what teams are actually dealing with. Thanks to: 🔹 Shashank . – Co-founder & CEO at CredShields 🔹 Abhinav Chourasia – Director, Security Engineering at Tekion 🔹 Mohan Sekar – Sr. Director, Product Security at Cloud Software Group We dove into areas that often get hand-waved in meetings: - Are developers truly owning security? And should they? - Is Shift Left enough, or is post-prod visibility just as critical? - How do you prioritize thousands of open vulnerabilities? - Why are organizations still getting breached, despite all sorts of internal tooling? - Is cosmetic security useful? Or orgs should focus on deep scans and true visibility. - And yes, Developer velocity vs Security. #CyberSecurity #AppSec #EASM #ProductSecurity #SecurityLeadership RedHunt Labs
129
2 commentaires -
Andrew Ginter
Waterfall Security Solutions
I’m pleased to announce the release of my new guide ‘Rethinking Secure Remote Access for Industrial and OT Networks’. This guide explores today’s evolving threat landscape and breaks down the strengths and weaknesses of different kinds of remote access technologies. The eBook is designed to help people understand which solutions truly protect critical operations, and which leave those operations unacceptably exposed. Get your free copy here and I look forward to hearing your thoughts ➡️ https://bit.ly/3JKfBTR
66
3 commentaires -
Siva VRS
Wipro
Many Security Operations Centers (SOCs) today are equipped with powerful tools. But complex infrastructures create siloed data sources and operational inefficiencies that hinder quick and effective threat response. Without automation at the core of SecOps, security teams can suffer from: ––Analyst fatigue due to a high number of alerts and false positives ––Elevated mean time to detect (MTTD) due to multiple disjointed detection and investigation technologies ––Increased total cost of ownership (TCO) for security monitoring and defense response ––Inefficient remediation and high mean time to respond (MTTR) Read this research study and discover how to overcome SOC complexities and inefficiencies: https://lnkd.in/exeJsGPG #SOC #CyberResilience #Cybersecurity Wipro + Palo Alto Networks
50
-
Victor Desteucq
Palo Alto Networks
🔊 RSA Conference 2025 is in full swing… and one topic is dominating every conversation: the Secure Enterprise Browser. Across every industry, every region, and every kind of IT setup — from lean teams to complex global infrastructures — the interest is universal. 👥 Back-to-back meetings, nonstop demos, POC requests flooding in — the momentum is real. And here’s what the industry is saying: 👉“Secure enterprise browsers represent a compelling solution to consolidate security controls while improving user experience”, Gartner 👉“There’s a significant uptick in phishing, fraud and identity-based attacks occurring within the browser itself”, Information Security Media Group (ISMG) - https://lnkd.in/ePk8Jzwf 👉“Palo Alto Networks is bringing enterprise-grade protection directly into the browser, giving organizations a new level of control over AI usage, data exfiltration and user behavior — without adding friction”, CRN 👉“Consumer browsers were not designed for enterprise use or the challenging environments in which we now run them. If attackers take over a browser, then pretty much they have access to all our data”, Ofer Ben-Noon 🙏 Huge thanks to our customers for their trust and feedback — and to everyone showing strong interest in PAB. Curious why everyone’s talking about it? 💻 Try it for yourself: no architecture changes, silent deployment… and full visibility & control in just minutes. Elad Gavra, Glenn M., Justin Kapahi, Chris Gaba, Shlomi Zrahia, Guy Harpak - https://lnkd.in/emw6kdzp
53
1 commentaire -
Marco Rottigni
SentinelOne
Our Global Threat Report is out now. Packed with insights from the front lines, it’s your ultimate guide to what’s shaping cybersecurity this year and beyond. Inside you’ll find: 1️⃣ Top Threats — The most intense AND most persistent risks 2️⃣ Real-World Intrusions — Deep-dive IR case studies (yes, including data theft via JIRA) 3️⃣ Strategic Outlook — What CISOs must prioritize to stay ahead Get the full report and stay one step ahead: https://s1.ai/ThrtRt-25
23
-
Antonio Feninno
Semperis
🚨 Active Directory is less like a castle—and more like the spine in your body. Break it, and nothing moves. We’re in 2025. Ransomware actors are evolving. Supply chain attackers are thinking months ahead. And yet… the most critical identity system in the enterprise—Active Directory (AD)—is still treated like old plumbing. 🔐 Here’s the uncomfortable truth: AD isn’t legacy tech. It’s your central nervous system—controlling every login, every system, every trust. And attackers now know how to sever it with surgical precision. 🧠 When AD is compromised, it’s not a typical breach. It’s full-system paralysis. No access. No controls. No recovery—until they say so. ⸻ 🧨 Just this year: • In April 2025, Marks & Spencer was hit hard. Attackers stole AD secrets (the NTDS.dit file), used them to deploy ransomware across 1,000+ stores, and brought operations to a halt. • Microsoft’s own Windows Server 2025 introduced BadSuccessor, a now-public flaw in delegated Managed Service Accounts (dMSA) that allows silent privilege escalation to any user—including domain admins—through default configurations. ⸻ 💸 But what’s the real cost when AD goes dark? Most teams don’t know. Until they’re living it. 📊 Verified data shows: • For large enterprises: 💰 $14,056 per minute → $20.2 million per day (Source: BigPanda via Gartner) • For industrial sectors (e.g. automotive): 💰 $2.3 million per hour → $55.2 million per day (Source: Siemens, 2024) • For SMBs: 💰 Up to $55,000 per day in lost revenue, recovery costs, and reputational damage (Source: EN Computers) These aren’t inflated numbers. They include: • Lost transactions and sales • SLA and compliance penalties • Recovery staffing and IR costs • Long-term trust erosion And almost all of them stem from a single point of failure: identity. ⸻ 🔥 AD isn’t infrastructure. It’s your digital spine. Bend it, and your company might survive. Break it, and you’re flatlined. ⏳ If you haven’t assessed AD attack paths, hardened your trust relationships, or validated recovery—this is your warning. 💬 Ready to rethink your identity security strategy? Let’s talk. #IdentitySecurity #ActiveDirectory #Semperis #CyberSecurity #ZeroTrust #IncidentResponse #Ransomware #ADSecurity #CyberResilience #CISO
26
-
Shawn Reilly
A10 Networks, Inc
A10 Networks, Inc announces new AI firewall capabilities that can be deployed in front of APIs or URLs that expose large language models – either as a custom LLM or developed on top of a commercial solution like OpenAI or Anthropic. Built on edge-optimized architecture with GPU-enabled hardware, these capabilities protect AI LLMs at high performance and can be deployed in any infrastructure as an incremental security capability. #softwareengineering #innovation #informationsecurity #cloud #technology #ai
27
-
Huseyin ERDAL
HYAS
HYAS Highlights 📌 ✅ Advanced Threat Prevention Utilizes Machine Learning for intelligent threat detection Leverages Authoritative Attacker Infrastructure Knowledge Powered by Unrivaled Domain-based Intelligence Enables organizations to proactively prevent threats ✅ Effective Attack Disruption Eliminates attacker communications and renders attacks ineffective Blocks malicious domains and C2 infrastructure before they can cause harm ✅ Seamless Integration & Visibility Provides DNS visibility without requiring infrastructure replacement No need to replace existing tools or security stack Offers VPN network visibility for full traffic analysis ✅ Comprehensive Threat Intelligence Supports First Seen / Last Seen Domain checks to track domain risk over time Enables Proactive Threat Hunting with deep DNS intelligence ✅ Ease of Deployment & Operations Agent-less deployment — fast and easy to roll out One-click infected device detection for rapid response #DNSProtect #DNSSight #DNSVisibility #SeamlessIntegration #NetworkSecurity #VPNVisibility #AgentlessDeployment #RapidResponse #CyberOps #SecurityOperations #C2Protection #CyberSecurity
22
-
Ashley Watkins
Trend Micro
EDR - XDR - SIEM - AI Security acronyms aren’t just buzzwords — they’re signposts of evolution. Many security leaders ask themselves this question: “When is it time to converge?” The answer: It already is. Gartner, Forrester, and IDC have all pointed to the need for platformization — converging siloed security tools into integrated platforms that unify data, accelerate response, and reduce operational fatigue. It’s not just about visibility. It’s about outcomes: better risk posture, faster decision-making, and tighter alignment between security and business. The most secure, agile organizations are already moving this way — integrating XDR, SIEM, SOAR, and AI under one intelligent architecture. They’re not patching complexity — they’re replacing it. This is Cyber Platform Thinking — and it’s the foundation of Trend Micro’s Vision One platform. Because when you unify your defense stack and let intelligence flow freely, you don’t just detect more. You lead more. #CyberInsights #XDR #AI #SecurityPlatform #TrendMicro #PlatformStrategy #CISO #CyberLeadership #AnalystPerspectives #RiskManagement https://lnkd.in/gavVriaM
22
-
Juan Luis Garijo del Cura
🆕 CrowdStrike is acquiring Onum to supercharge autonomous cybersecurity with real-time data pipelines. If Falcon SIEM is the engine of the modern SOC, Onum is both the pipeline + filter — streaming high-quality, filtered fuel quickly into the engine to drive more efficient and superior performance. Onum delivers transformational advantages across three critical dimensions: ⚡ Speed: Delivers 5X more events per second than its nearest competitor and processes security and observability data in real-time versus legacy batch and store methods. ⚡ Cost: Smart filtering reduces data storage costs by 50% through intelligent optimization. ⚡ Superior Outcomes: Real-time pipeline detection starts before data enters the Falcon platform, delivering up to 70% faster incident response with 40% less ingestion overhead. The future of cybersecurity is here – built on real-time, high-fidelity data. 👉 Learn more: https://lnkd.in/dWqhJXQK
237
2 commentaires -
Milan Singh Thakur
OWASP Dubai Chapter
A Zero-Trust Architecture (ZTA) enables secure authorized access to assets — machines, applications and services running on them, and associated data and resources — whether located on-premises or in the cloud, for a hybrid workforce and partners based on an organization’s defined access policy
14
2 commentaires -
Ankush Baveja
Palo Alto Networks
In SE Labs’ latest Ransomware Test Report, Cortex XDR delivered a perfect score — 100% prevention, 0 false positives — and earned their highest possible rating: AAA. Why this matters: ransomware is projected to cost organizations $275B a year by 2031, with a new attack every 2 seconds. These tests weren’t lab-only simulations — they used 556 real-world samples, including brand-new threats delivered via phishing and other common entry points Report Attached below
69