Image Military Operations and AI: What Role for Humans in the Decision-Making Loop?
Cyber stability
04.15.25 Cyber stability
Military Operations and AI: What Role for Humans in the Decision-Making Loop?
Read
05
MIN
Image Security requirements for connected products: the disruption brought by the Cyber Resilience Act
Cyber stability
04.14.25 Cyber stability
Security requirements for connected products: the disruption brought by the Cyber Resilience Act
Read
07
MIN
Image NIS2: The challenge of scaling up
Cybersecurity
04.11.25 Cybersecurity
NIS2: The challenge of scaling up
Read
04
MIN
Image Social Networks: The End of Fact-Checking Disrupts Moderation Policies
Digital Sovereignty
Social Networks: The End of Fact-Checking Disrupts Moderation Policies
Read
07
MIN
Image 2025: A key year for OSINT and cybersecurity
Cybersecurity
02.07.25 Cybersecurity
2025: A key year for OSINT and cybersecurity
Read
02
MIN
Image DeepSeek: A Shockwave for Global Artificial Intelligence
Digital transformation
DeepSeek: A Shockwave for Global Artificial Intelligence
Read
04
MIN
Image DORA: A Structural Revolution is underway
Digital Sovereignty
DORA: A Structural Revolution is underway
Read
06
MIN
Image NIS2: Who stands to gain?
Digital transformation
NIS2: Who stands to gain?
Read
04
MIN
Image The Financial Aspects of Blockchain: Opportunities and Implications for the Financial Sector
Digital transformation
The Financial Aspects of Blockchain: Opportunities and Implications for the Financial Sector
Read
04
MIN
Image The Evolution and Future of Internet Decentralization
Digital transformation
The Evolution and Future of Internet Decentralization
Read
04
MIN
Image From cybersecurity to resilience: at the heart of REC, DORA & NIS 2 transpositions
Cybersecurity
12.03.24 Cybersecurity
From cybersecurity to resilience: at the heart of REC, DORA & NIS 2 transpositions
Read
05
MIN
Image Linking health insurance card and Id Card: a good idea to combat social fraud?
Digital Sovereignty
Linking health insurance card and Id Card: a good idea to combat social fraud?
Read
04
MIN
Image The Post-Quantum Era: What Legal Perspectives Are Emerging?
Digital transformation
The Post-Quantum Era: What Legal Perspectives Are Emerging?
Read
04
MIN
Image Cyberattacks on big companies: what managers need to know
Cybersecurity
10.01.24 Cybersecurity
Cyberattacks on big companies: what managers need to know
Read
06
MIN
Image Web3, mobile dApps and cybersecurity: an overview 
Digital transformation
Web3, mobile dApps and cybersecurity: an overview 
Read
06
MIN
Image Cybersecurity and Blockchain: What are the prospects?
Digital transformation
Cybersecurity and Blockchain: What are the prospects?
Read
04
MIN
Image From London to Paris: the changing threat landscape of high-profile international events
Digital transformation
From London to Paris: the changing threat landscape of high-profile international events
Read
05
MIN
Image PhilosoFIC:are generative algorithms accelerators or the gravediggers of human intelligence?
Digital transformation
PhilosoFIC:are generative algorithms accelerators or the gravediggers of human intelligence?
Read
06
MIN
Image ECHR defends conversation encryption
Digital transformation
ECHR defends conversation encryption
Read
02
MIN
Image "Her": an intimate, futuristic drama that examines the relationships between a hybrid couple
Digital transformation
“Her”: an intimate, futuristic drama that examines the relationships between a hybrid couple
Read
07
MIN
Image Regulating competition in the AI market: a new David versus Goliath?
Digital transformation
Regulating competition in the AI market: a new David versus Goliath?
Read
07
MIN