Cybersecurity Best Practices Every Business Needs to Follow Today
Cybersecurity isn’t just an IT concern anymore, gone are the days when a ‘seasoned’ system…
Hornetsecurity
Hornetsecurity, leader européen du domaine de la sécurité, de la conformité et de la sauvegarde des emails dans le cloud, nous formons une communauté de 750 collaborateurs répartis dans 10 pays. Nous aidons plus de 125 000 clients dans le monde (entreprises, PME, ONG, institutions, hôpitaux) à maintenir leur activité, à prospérer et à accomplir leur mission, grâce à des technologies basées sur l’IA. Nous recherchons un(e) Développeur Backend (h/f) dans notre bureaux de Hem.
En tant que membre de l’équipe Filtering Technologies du département Security Lab, vous jouerez un rôle central dans la conception, le développement, la maintenance, et le déploiement de technologies innovantes permettant la détection des menaces transmises par email ou URL. Ces technologies sont au cœur des solutions de sécurité Hornetsecurity.
Vos activités seront les suivantes :
You can send your application to job@hornetsecurity.com. If you have any further questions, please do not hesitate to write us via WhatsApp on +49 511 515 464-99.
Hornetsecurity is a leading global provider of next-generation cloud-based security, compliance, backup, and security awareness solutions that help companies and organisations of all sizes around the world. Its flagship product, 365 Total Protection, is the most comprehensive cloud security solution for Microsoft 365 on the market. Driven by innovation and cybersecurity excellence, Hornetsecurity is building a safer digital future and sustainable security cultures with its award-winning portfolio. Hornetsecurity operates in more than 120 countries through its international distribution network of 12,000+ channel partners and MSPs. Its premium services are used by more than 125,000 customers.
Cybersecurity isn’t just an IT concern anymore, gone are the days when a ‘seasoned’ system…
In this article we’ll look at the risks, the current state of various attacks against this underlying document…
This blog explores why backup of Entra ID is now a critical requirement for IT…