Pôle Emploi Company Cyber Security Posture

pole-emploi.fr

BD COM Software est le distributeur exclusif au sein de la Communauté Européenne la plateforme "IKON" développée par la Société Keross. IKON en quelques mots : La solution IKON aide les entreprises à améliorer à la fois les performances de leur service informatique et l'ensemble de leurs activités. Garantissant une surveillance unifiée en temps réel des différents processus et systèmes qui constituent le coeur même des performances de l'entreprise. Une plateforme unifiée en mode SaaSou en déploiement autonome : 8 modules qui répondent à chacune des fonctions sensibles d'une entreprise en terme de supervision, gestion et prise de décision. Une approche orientée services : - Manipulation des données IT et fonctionnelles - Corrélation des informations - Gestion des SLAs, KPIs et KRIs - Meilleur confort de la gestion de l'environnement - Qualité de service optimisée - Réduction du temps et des coûts "Un Business Model" unique au service des clients.

Pôle Emploi Company Details

Linkedin ID:

bd-com-software

Employees number:

485 employees

Number of followers:

3836

NAICS:

922

Industry Type:

Government Administration

Homepage:

pole-emploi.fr

IP Addresses:

Scan still pending

Company ID:

PÔL_5332468

Scan Status:

In-progress

AI scorePôle Emploi Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscorePôle Emploi Global Score
blurone
Ailogo

Pôle Emploi Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Pôle Emploi Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
Pôle EmploiRansomware100411/2023PLE45941223Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The MOVEit Transfer file transfer platform, created by Progress Software Corporation, was the subject of a recent, major hacking effort by the Cl0p ransomware group, according to alarming information disclosed by cybersecurity firm Emsisoft. The analysts estimate that 60,144,069 people and about 1,000 organisations were affected by the attacks. The Cl0p group's leak site, state breach reports, SEC filings, and other public disclosures are the sources of the data. The attacks affected tens of millions of people, according to the experts. Maximus, Pôle emploi, Louisiana Office of Motor Vehicles, Colorado Department of Health Care Policy and Financing, Oregon Department of Transportation, Teachers Insurance and Annuity Association of America, Genworth, PH Tech, and Milliman Solutions are the organisations with the greatest number of affected persons.

Pôle Emploi Company Subsidiaries

SubsidiaryImage

BD COM Software est le distributeur exclusif au sein de la Communauté Européenne la plateforme "IKON" développée par la Société Keross. IKON en quelques mots : La solution IKON aide les entreprises à améliorer à la fois les performances de leur service informatique et l'ensemble de leurs activités. Garantissant une surveillance unifiée en temps réel des différents processus et systèmes qui constituent le coeur même des performances de l'entreprise. Une plateforme unifiée en mode SaaSou en déploiement autonome : 8 modules qui répondent à chacune des fonctions sensibles d'une entreprise en terme de supervision, gestion et prise de décision. Une approche orientée services : - Manipulation des données IT et fonctionnelles - Corrélation des informations - Gestion des SLAs, KPIs et KRIs - Meilleur confort de la gestion de l'environnement - Qualité de service optimisée - Réduction du temps et des coûts "Un Business Model" unique au service des clients.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=bd-com-software' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Pôle Emploi Cyber Security News

2024-10-14T07:00:00.000Z
Cyber Attack Hits French Leading News Agency AFP

French news agency Agence France-Presse (AFP) suffered a cyber attack that disrupted its content delivery infrastructure and file transfer ...

2024-09-05T07:00:00.000Z
The biggest cyber attacks of 2024

The devastating attack against IPL Consulting was carried out by GUR specialists, who penetrated the company's internal network and destroyed ...

2024-03-18T07:00:00.000Z
43 million workers potentially affected in France Travail data breach

France Travail (formerly Pôle emploi) and Cap emploi, a government employment service for people with disabilities, have suffered a data breach.

2024-07-16T07:00:00.000Z
Major data breaches that have rocked organizations in 2024

This article provides an overview of the major data breaches we covered in 2024 so far, highlighting incidents involving Trello, AnyDesk, France ...

2024-03-15T07:00:00.000Z
Massive Data Breach Exposes Info of 43 Million French Workers

A massive data breach at a French employment agency is affecting over 43 million users – representing more than half of France's total ...

2024-02-21T08:00:00.000Z
Data Centre World Paris 2023 sets new benchmarks with expert insights and global perspectives

Data Centre World Paris leads the way as a premier event for the data centre sector, featuring a compelling lineup of sessions and speakers ...

similarCompanies

Pôle Emploi Similar Companies

U.S. Department of Homeland Security

The Department of Homeland Security (DHS) has a vital mission: to secure the nation from the many threats we face. This requires the hard work of more than 260,000 employees in jobs that range from aviation and border security to emergency response, from cybersecurity analyst to chemical facility in

Ministry of the Interior and Kingdom Relations

Het ministerie van BZK borgt de kernwaarden van de democratie. BZK staat voor een goed en slagvaardig openbaar bestuur en een overheid waar burgers op kunnen vertrouwen. BZK draagt eraan bij dat burgers kunnen wonen in betaalbare, veilige en energiezuinige woningen in een buurt waar iedereen meetelt

County of Santa Clara

The County of Santa Clara is located at the southern end of the San Francisco Bay and encompasses 1,312 square miles. It has one of the highest median family incomes in the country, and a wide diversity of cultures, backgrounds and talents. The County of Santa Clara continues to attract people fro

Government of Alberta

Work with the Alberta government to build a stronger province for current and future generations. We offer diverse and rewarding employment opportunities in an environment that encourages continuous learning and career growth. We are one of the largest employers in Alberta with over 27,000 empl

Warwickshire County Council

County level local government authority. The County Council Warwickshire County Council provides a wide range of services to over half a million residents. It works with other public, private and voluntary bodies to make Warwickshire a better place for people to live and work. It has specifi

Secretaría de Educación Pública

MISIÓN/PROPÓSITO: La SEP tiene como propósito esencial crear condiciones que permitan asegurar el acceso de todas las mexicanas y mexicanos a una educación de calidad, en el nivel y modalidad que la requieran y en el lugar donde la demanden. VISIÓN: En el año 2025, México cuenta con un sistema

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Pôle Emploi CyberSecurity History Information

How many cyber incidents has Pôle Emploi faced?

Total Incidents: According to Rankiteo, Pôle Emploi has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at Pôle Emploi?

Incident Types: The types of cybersecurity incidents that have occurred incident Ransomware.

Incident Details

Can you provide details on each incident?

Incident : Ransomware

Title: MOVEit Transfer File Transfer Platform Hack

Description: The MOVEit Transfer file transfer platform, created by Progress Software Corporation, was the subject of a recent, major hacking effort by the Cl0p ransomware group.

Type: Ransomware

Threat Actor: Cl0p ransomware group

Motivation: Financial

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident?

Incident : Ransomware PLE45941223

Data Compromised: 60,144,069 people and about 1,000 organisations

Which entities were affected by each incident?

Incident : Ransomware PLE45941223

Entity Type: Software Company

Industry: Technology

Customers Affected: 60,144,069 people and about 1,000 organisations

Incident : Ransomware PLE45941223

Entity Type: Organization

Incident : Ransomware PLE45941223

Entity Type: Organization

Incident : Ransomware PLE45941223

Entity Type: Government Agency

Industry: Public Sector

Location: Louisiana

Incident : Ransomware PLE45941223

Entity Type: Government Agency

Industry: Public Sector

Location: Colorado

Incident : Ransomware PLE45941223

Entity Type: Government Agency

Industry: Public Sector

Location: Oregon

Incident : Ransomware PLE45941223

Entity Type: Organization

Industry: Finance

Incident : Ransomware PLE45941223

Entity Type: Organization

Incident : Ransomware PLE45941223

Entity Type: Organization

Incident : Ransomware PLE45941223

Entity Type: Organization

Data Breach Information

What type of data was compromised in each breach?

Incident : Ransomware PLE45941223

Number of Records Exposed: 60,144,069

Ransomware Information

Was ransomware involved in any of the incidents?

Incident : Ransomware PLE45941223

Ransomware Strain: Cl0p

References

Where can I find more information about each incident?

Incident : Ransomware PLE45941223

Source: Emsisoft

Incident : Ransomware PLE45941223

Source: Cl0p group's leak site

Incident : Ransomware PLE45941223

Source: State breach reports

Incident : Ransomware PLE45941223

Source: SEC filings

Incident : Ransomware PLE45941223

Source: Other public disclosures

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Emsisoft, and Source: Cl0p group's leak site, and Source: State breach reports, and Source: SEC filings, and Source: Other public disclosures.

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident was an Cl0p ransomware group.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were 60,144,069 people and about 1 and000 organisations.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were 60,144,069 people and about 1 and000 organisations.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 60.1M.

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident are Emsisoft, Cl0p group's leak site, State breach reports, SEC filings and Other public disclosures.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge