Image They want to put humans back into AI to save it from itself. Who are they?
Cyber +
03.05.26 Cyber +
They want to put humans back into AI to save it from itself. Who are they?
Read
06
MIN
Image From theory to practice: Belgium’s experience implementing the NIS2 directive
Cybersecurity
03.02.26 Cybersecurity
From theory to practice: Belgium’s experience implementing the NIS2 directive
Read
08
MIN
Image Shadow AI, the blind spot undermining cyber governance in SMEs and mid-sized companies
Digital transformation
Shadow AI, the blind spot undermining cyber governance in SMEs and mid-sized companies
Read
07
MIN
Image Access Control for Minors on Social Media: The Global Agreement
Cyber +
02.19.26 Cyber +
Access Control for Minors on Social Media: The Global Agreement
Read
07
MIN
Image OSINT Put to the Test of AI: Exploring, Measuring, Verifying
Digital transformation
OSINT Put to the Test of AI: Exploring, Measuring, Verifying
Read
06
MIN
Image Iran: between isolation and technological resilience
Digital transformation
Iran: between isolation and technological resilience
Read
04
MIN
Image From Factory of the World to Tech Giant: The Drivers of China’s Rise
Digital transformation
From Factory of the World to Tech Giant: The Drivers of China’s Rise
Read
06
MIN
Image European Cybersecurity Reserve: The Union Builds a Common Shield
Cybersecurity
10.20.25 Cybersecurity
European Cybersecurity Reserve: The Union Builds a Common Shield
Read
04
MIN
Image Agentic AI: New Threats, New Defenses
Digital transformation
Agentic AI: New Threats, New Defenses
Read
05
MIN
Image The SIH Alliance Wants to Build the Hospital Information System of Tomorrow
Cybersecurity
05.28.25 Cybersecurity
The SIH Alliance Wants to Build the Hospital Information System of Tomorrow
Read
03
MIN
Image Trust & Safety: The Stakeholders of Digital Trust Under Pressure
Digital transformation
Trust & Safety: The Stakeholders of Digital Trust Under Pressure
Read
06
MIN
Image Military Operations and AI: What Role for Humans in the Decision-Making Loop?
Cyber stability
04.15.25 Cyber stability
Military Operations and AI: What Role for Humans in the Decision-Making Loop?
Read
05
MIN
Image Security requirements for connected products: the disruption brought by the Cyber Resilience Act
Cyber stability
04.14.25 Cyber stability
Security requirements for connected products: the disruption brought by the Cyber Resilience Act
Read
07
MIN
Image NIS2: The challenge of scaling up
Cybersecurity
04.11.25 Cybersecurity
NIS2: The challenge of scaling up
Read
04
MIN
Image Social Networks: The End of Fact-Checking Disrupts Moderation Policies
Digital Sovereignty
Social Networks: The End of Fact-Checking Disrupts Moderation Policies
Read
07
MIN
Image 2025: A key year for OSINT and cybersecurity
Cybersecurity
02.07.25 Cybersecurity
2025: A key year for OSINT and cybersecurity
Read
02
MIN
Image DeepSeek: A Shockwave for Global Artificial Intelligence
Digital transformation
DeepSeek: A Shockwave for Global Artificial Intelligence
Read
04
MIN
Image DORA: A Structural Revolution is underway
Digital Sovereignty
DORA: A Structural Revolution is underway
Read
06
MIN
Image NIS2: Who stands to gain?
Digital transformation
NIS2: Who stands to gain?
Read
04
MIN
Image The Financial Aspects of Blockchain: Opportunities and Implications for the Financial Sector
Digital transformation
The Financial Aspects of Blockchain: Opportunities and Implications for the Financial Sector
Read
04
MIN
Image The Evolution and Future of Internet Decentralization
Digital transformation
The Evolution and Future of Internet Decentralization
Read
04
MIN