Image From cybersecurity to resilience: at the heart of REC, DORA & NIS 2 transpositions
Cybersecurity
12.03.24 Cybersecurity
From cybersecurity to resilience: at the heart of REC, DORA & NIS 2 transpositions
Read
05
MIN
Image Digital Identity at risk: lessons from repeated data breaches
Cybersecurity
11.29.24 Cybersecurity
Digital Identity at risk: lessons from repeated data breaches
Read
05
MIN
Image The CISO of tomorrow: preparing for the worst in the age of AI and increasingly complex cyber threats
Cybersecurity
11.22.24 Cybersecurity
The CISO of tomorrow: preparing for the worst in the age of AI and increasingly complex cyber threats
Read
04
MIN
Image Strengthening France's Strategic Position in the [Undersea Cable] Sector
Cybersecurity
11.12.24 Cybersecurity
Strengthening France’s Strategic Position in the Undersea Cable Sector
Read
09
MIN
Image Paris 2024 Olympics: Gold medal for the "Cyber Team"
Cyber stability
10.21.24 Cyber stability
Paris 2024 Olympics: Gold medal for the “Cyber Team”
Read
07
MIN
Image "In the shoes of a CISO faced with a cyber attack
Cybercrime
10.16.24 Cybercrime
“In the shoes of a CISO faced with a cyber attack
Read
05
MIN
Image Hidden costs: ignoring software patches can cripple your business
Cyber stability
10.14.24 Cyber stability
Hidden costs: ignoring software patches can cripple your business
Read
07
MIN
Image Cyberattacks on big companies: what managers need to know
Cybersecurity
10.01.24 Cybersecurity
Cyberattacks on big companies: what managers need to know
Read
06
MIN
Image A win-win approach to cybersecurity
Cybersecurity
09.27.24 Cybersecurity
A win-win approach to cybersecurity
Read
06
MIN
Image Social Engineering on the attack: what [Cybermoi/s] 2024 Has in Store for You (2/2)
Cyber +
09.26.24 Cyber +
Social Engineering on the attack: what Cybermoi/s 2024 Has in Store for You (2/2)
Read
06
MIN
Image Social engineering on the attack: What [Cybermoi/s 2024] has in store for You (1/2)
Cyber +
09.25.24 Cyber +
Social engineering on the attack: What Cybermoi/s 2024 has in store for You (1/2)
Read
03
MIN
Image Claire Lemarchand: "After a cyberattack, the biggest mistake is restarting too quickly"
Cybersecurity
07.19.24 Cybersecurity
Claire Lemarchand: “After a cyberattack, the biggest mistake is restarting too quickly”
Read
04
MIN
Image Trusted Data at the Core of OneTrust's Platform
Cybersecurity
05.27.24 Cybersecurity
Trusted Data at the Core of OneTrust’s Platform
Read
04
MIN