Marion Cuisinier

Product Marketer

Marion Cuisinier

Product Marketer

I joined POST Telecom in 2018 as a B2B Product Marketer after completing a Master’s degree in Marketing at NEOMA Business School. Today, I'm in charge of DEEP's digital marketing.

I cover cybersecurity, connectivity and IoT products, and part of my role is helping companies find the solutions that meet their needs, especially as regards the digital transformation.

In this blog, we share news and trends for the sector, customer interviews and tips, as well as statistics for professionals with an interest in issues related to our areas of expertise: cloud, telephony, IoT, security, networks, data intelligence and more.

I hope you enjoy reading it!

Articles written by Marion Cuisinier

Ensuring the security of healthcare professionals and patient data

In Luxembourg, IT security for healthcare professionals is managed by Healthnet. Operated by DEEP's teams, this shared network dedicated to players in the sector brings together a range of services, solutions and data that healthcare professionals need to access. This shared platform makes it easier to implement and monitor robust security policies.

Read this article

Published on

29 October 2024

How can you protect yourself from the upsurge in spearphishing?

Spearphishing is an elaborate approach which seeks to impersonate a colleague or a manager in order to obtain information or ask someone to make illegitimate transactions. These particularly insidious attacks are more difficult to identify. There are, however, good practices and tools to prevent this type of threat.

Read this article

Published on

11 September 2024

Preparing for NIS2 requirements

Through NIS2, the European regulator is requiring critical players and organisations with a systemic position to strengthen the security measures of their information systems.

Read this article

Published on

04 September 2024

Preparing for the new DORA regulations

The new European DORA regulation (Digital Operational Resilience Act) will come into force on 17 January 2025.

Read this article

Published on

02 July 2024

Protecting data from any eventuality

People with dubious intentions are increasingly looking to access corporate data, which must be protected from any eventuality if a business is to remain in good health. Companies therefore make regular backups, so that they can restore data after an incident. But what happens if the backups themselves are compromised or cannot be recovered? With this in mind, POST Luxembourg has introduced a new solution: Cyber Vault.

Read this article

Published on

29 April 2024

Interview with 4 women in tech

As part of International Women's Rights Day, discover our interview with 4 "Women of Tech".

Read this article

Published on

06 March 2024

Cyberscore: the Security Rating for SMEs in Luxembourg

A Cyberscore is an initiative developed by POST and Luxcontrol to help small and medium-sized companies in Luxembourg tackle cybersecurity issues more easily.

Read this article

Published on

24 October 2023

7 key technological trends and developments in 2023

Accompany us, and our partner Splunk, to find out about the trends and technological developments to watch out for in the coming months.

Read this article

Published on

03 April 2023

Importance of a business continuity plan: resilience and crisis management at the heart of all concerns.

Resilience and crisis management at the center of all concerns. Is your organization ready? To find out if you are sufficiently prepared, evaluate your level of maturity with DEEP.

Read this article

Published on

05 October 2022

Is the metaverse the future of the Internet?

Bloomberg estimates that the metaverse market could be worth $800 billion by 2024, and yet this emerging phenomenon remains a mystery to many of us. Why should we find out more and what can we expect?

Read this article

Published on

13 September 2022

The Cyberforce team interview

“The most striking event of 2021 was undoubtedly the reporting and malicious exploitation of the log4j vulnerability.”

Read this article

Published on

19 July 2022

Our experts answer your questions

Do you have any questions about an article? Do you need help solving your IT issues?