Image Online regulation of minors : young and overlooked
Cybersecurity
04.21.26 Cybersecurity
Online regulation of minors : young and overlooked
Read
07
MIN
Image Ukraine Confirms Russian Cyber Espionage Operation Targeting Prosecutors and Anti-Corruption Agencies
Cybersecurity
04.20.26 Cybersecurity
Ukraine Confirms Russian Cyber Espionage Operation Targeting Prosecutors and Anti-Corruption Agencies
Read
01
MIN
Image OpenAI ramps up cyber defense with GPT-5.4-Cyber, directly challenging Anthropic
Cybersecurity
04.17.26 Cybersecurity
OpenAI ramps up cyber defense with GPT-5.4-Cyber, directly challenging Anthropic
Read
02
MIN
Image [INCYBER 2026] Cyber risk: governance shifts toward a business continuity logic
Cybersecurity
04.14.26 Cybersecurity
INCYBER 2026 Cyber risk: governance shifts toward a business continuity logic
Read
06
MIN
Image Where do French companies stand on data governance in the age of AI?
Cybersecurity
04.01.26 Cybersecurity
Where do French companies stand on data governance in the age of AI?
Read
05
MIN
Image Zero Trust Strategy and AI: The Real Challenge Is Not the Algorithm, but the Quality of the Information System
Cybersecurity
03.11.26 Cybersecurity
Zero Trust Strategy and AI: The Real Challenge Is Not the Algorithm, but the Quality of the Information System
Read
06
MIN
Image From theory to practice: Belgium’s experience implementing the NIS2 directive
Cybersecurity
03.02.26 Cybersecurity
From theory to practice: Belgium’s experience implementing the NIS2 directive
Read
08
MIN
Image Chinese Cyber-Espionage Group Exploits Critical 0-Day in Dell RecoverPoint
Cybersecurity
02.19.26 Cybersecurity
Chinese Cyber-Espionage Group Exploits Critical 0-Day in Dell RecoverPoint
Read
02
MIN
Image Cyber startups: 10 tips for moving from concept to commercialization
Cyber +
02.19.26 Cyber +
Cyber startups: 10 tips for moving from concept to commercialization
Read
08
MIN
Image Cyberattacks Targeting the Defense Industrial Base Are Increasing
Cybersecurity
02.17.26 Cybersecurity
Cyberattacks Targeting the Defense Industrial Base Are Increasing
Read
01
MIN
Image United States: Joshua Rudd could be appointed to lead Cyber Command and the NSA
Cybersecurity
02.13.26 Cybersecurity
United States: Joshua Rudd could be appointed to lead Cyber Command and the NSA
Read
01
MIN
Image Cybersecurity for mid-sized companies: from awareness to strategic structuring
Cybersecurity
02.09.26 Cybersecurity
Cybersecurity for mid-sized companies: from awareness to strategic structuring
Read
05
MIN
Image Hyper-Volumetric DDoS Attacks: The Threat Reaches a New Scale
Cybercrime
01.15.26 Cybercrime
Hyper-Volumetric DDoS Attacks: The Threat Reaches a New Scale
Read
07
MIN
Image United States: President Trump Orders Withdrawal from 66 International Organizations
Cybersecurity
01.09.26 Cybersecurity
United States: President Trump Orders Withdrawal from 66 International Organizations
Read
01
MIN
Image [Roads of surveillance] Episode 3: Israel – Global Hub of Cyber Offense
Cybersecurity
01.09.26 Cybersecurity
Roads of surveillance Episode 3: Israel – Global Hub of Cyber Offense
Read
13
MIN
Image Two months later, the cyberattack on Asahi continues to disrupt the group’s operations
Cybersecurity
12.01.25 Cybersecurity
Two months later, the cyberattack on Asahi continues to disrupt the group’s operations
Read
01
MIN
Image SBOM: From Regulatory Constraint to Cornerstone of Software Security
Cybersecurity
11.27.25 Cybersecurity
SBOM: From Regulatory Constraint to Cornerstone of Software Security
Read
07
MIN
Image Éric Singer, CISO at Ingenico, a craftsman of digital trust
Cybersecurity
11.21.25 Cybersecurity
Éric Singer, CISO at Ingenico, a craftsman of digital trust
Read
04
MIN
Image Cyber Risk Quantification (CRQ): Deciphering Financial Exposure to Better Prioritize Cybersecurity Investments
Cybersecurity
11.12.25 Cybersecurity
Cyber Risk Quantification (CRQ): Deciphering Financial Exposure to Better Prioritize Cybersecurity Investments
Read
09
MIN
Image United States: a “foreign actor” hacked the Congressional Budget Office
Cybersecurity
11.10.25 Cybersecurity
United States: a “foreign actor” hacked the Congressional Budget Office
Read
01
MIN
Image 2026, a year of major cyber threats according to Google
Cybersecurity
11.07.25 Cybersecurity
2026, a year of major cyber threats according to Google
Read
01
MIN