Category

News

Category

Legal_requirements_IoT_security

IoT security is a growing concern when developing connected devices and bringing them to market. However, there is presently a lack of clarity about the different regulations and requirements to respect, as many actors are working simultaneously on certifications, laws and/or standards. To help you figure this out, we’re presenting you very briefly some of the main legal requirements and standards currently in force that apply to consumer IoT devices.

We are happy and proud to share with you that we are now officially a CREST accredited company for penetration testing.

Vaadata is accredited as CREST penetration testing company

This accreditation demonstrates our commitment to
offer high level of professional penetration testing services. It certifies
that Vaadata respects appropriate processes and procedures for conducting
penetration testing and for the protection of its client information.

Here are the sources of the statistics used on our website:

Did you know ?

77% of organisations in the world were victimized by one (or more) successful cyberattack in 2017.
2018 Cyberthreat Defense Report. Cyberedge Group. (p. 3)
https://cyber-edge.com/wp-content/uploads/2018/03/CyberEdge-2018-CDR.pdf

48% of breaches featured hacking.
2018 Data Breach Investigations Report. Verizon. (p. 5)
https://www.verizonenterprise.com/resources/reports/rp_DBIR_2018_Report_en_xg.pdf

Vaadata is a start-up, specializing in web, mobile and IoT security. We are looking for two ethical hackers (pentesters) to join our team!

Who are we?

– A dynamic start-up and a hacking techniques specialist
– A small and fun team, with people who like freedom, unlike big companies’ corporate spirit
– An innovative company that provides time for technology watch and creativity

Who are we looking for?

– An experienced pentester OR a developer with security skills
– A passionate about hacking with experience on one (or more) of the following topics : web applications, mobile applications, connected devices, social engineering
– Versatile, resourceful, with a « hands on » attitude
– With a strong motivation for a start-up adventure within a cohesive team
– Able to work in English (a work experience in an international environment would be perfect) / native English is even a plus

Nous recrutons un hacker / developer - illustration

What is the job?

2018, year when the CEBIT reinvents itself to become a digital fair-festival. Let’s have a look black on that event where we were.

A Brand-new CEBIT

Existing since 1986, the CEBIT had its best years in the 1990s-2000s. There were then up to 6,500 exhibitors and 800,000 visitors.
Declining since, the CEBIT chose to transform into a fair-festival. Classic exhibition stands stay in the halls, meanwhile an open-air area in the middle of the exhibition grounds is dedicated to the festival. We can find there a Ferris wheel (SAP), a cloud lifter (IBM), a surf wave (INTEL), … various food trucks and concerts in evenings.

Statistics

Cyberattacks regularly did the news in 2017. It keeps going in 2018, from the Olympic Games to the record-breaking DdoS attacks (for those who missed the news: memcached reflection attack). This gives the impression that there are more and more cyberattacks, and that they are bigger and bigger. But actually, what is the situation?

We have put together some 2017 interesting statistics related to cybersecurity, focusing on data related to our speciality: penetration test on web platform, mobile applications and IoT.

At a Glance

Two main points are to notice:

  • 77% of organisations in the world were victims at least once of a successful cyberattack in 2017. (1)
  • On average, attacks are discovered after more than 6 months (191 days!) and corrected after more than 2 months (66 days). (2)

What is the GDPR?

In one year from today, the General Data Protection Regulation (GDPR) will be enforced in the European Union. This new regulation aims at unifying everything that had been done until now in terms of data protection in the EU, but also goes one step further with the sanctions for unlawful companies, and broadens the definition of private data.