Image 2020: A record year for data leaks
Cybercrime
07.07.21 Cybercrime
2020: A record year for data leaks
Read
06
MIN
Image “The question is no longer whether we can fall but how to overcome such an event”
Cybercrime
06.28.21 Cybercrime
“The question is no longer whether we can fall but how to overcome such an event”
Read
05
MIN
Image CFI, a new FIC offshoot dedicated to the security of operational technologies
Digital transformation
CFI, a new FIC offshoot dedicated to the security of operational technologies
Read
03
MIN
Image The French ‘Digital Defence Agency’ has been established
Digital transformation
The French ‘Digital Defence Agency’ has been established
Read
04
MIN
Image Realities and perspectives of the structuring of the Franco-German and European cloud
Digital Sovereignty
Realities and perspectives of the structuring of the Franco-German and European cloud
Read
15
MIN
Image Data at the Epicenter of Investigation
Digital transformation
Data at the Epicenter of Investigation
Read
07
MIN
Image Towards a Post-Digital Era ?
Digital transformation
Towards a Post-Digital Era ?
Read
05
MIN
Image Cybersecurity: The 10 Key Trends for 2020
Digital transformation
Cybersecurity: The 10 Key Trends for 2020
Read
03
MIN
Image Social science and cybersecurity: a key challenge for the future
Digital transformation
Social science and cybersecurity: a key challenge for the future
Read
03
MIN
Image How are your Emotions Manipulated through Social Networks? (by Guy Philippe Goldstein)
Digital transformation
How are your Emotions Manipulated through Social Networks? (by Guy Philippe Goldstein)
Read
01
MIN
Image The CLOUD Act, the latest American law that speaks volumes (by Olivier Iteanu, Lawyer)
Digital transformation
The CLOUD Act, the latest American law that speaks volumes (by Olivier Iteanu, Lawyer)
Read
03
MIN
Image Investment in cybersecurity: an upturn?
Digital transformation
Investment in cybersecurity: an upturn?
Read
05
MIN
Image Facebook: a move towards questioning the model?
Digital transformation
Facebook: a move towards questioning the model?
Read
04
MIN
Image CYBERSECURITY, AN ISSUE THAT MUST BE SHARED AT ALL LEVELS OF HIERARCHY
Cyber stability
03.21.18 Cyber stability
CYBERSECURITY, AN ISSUE THAT MUST BE SHARED AT ALL LEVELS OF HIERARCHY
Read
01
MIN
Image How 4chan and The_Donald Influence the Fake News Ecosystem (By Jeremy Blackburn, University of Alabama at Birmingham)
Digital transformation
How 4chan and The_Donald Influence the Fake News Ecosystem (By Jeremy Blackburn, University of Alabama at Birmingham)
Read
09
MIN
Image CrossCheck: An Initiative to Protect the French Presidential Elections from Fake News (Walid Salem, Rue 89)
Digital transformation
CrossCheck: An Initiative to Protect the French Presidential Elections from Fake News (Walid Salem, Rue 89)
Read
05
MIN
Image Making Digital Space Secure: the issues (By Air Force General (2S) Jean-Paul Paloméros)
Digital transformation
Making Digital Space Secure: the issues (By Air Force General (2S) Jean-Paul Paloméros)
Read
08
MIN
Image Security and Freedom: Inextricably Intertwined in the Digital Arena
Digital transformation
Security and Freedom: Inextricably Intertwined in the Digital Arena
Read
06
MIN
Image Cybersecurity: you’ll all be rated, sooner or later! (Guillaume Tissier, Managing Director, CEIS)
Digital transformation
Cybersecurity: you’ll all be rated, sooner or later! (Guillaume Tissier, Managing Director, CEIS)
Read
08
MIN
Image Security Beyond Smart Meters - Smart Homes (By Luay Baltaji, Cybersecurity Manager, OMNETRIC Group)
Digital transformation
Security Beyond Smart Meters – Smart Homes (By Luay Baltaji, Cybersecurity Manager, OMNETRIC Group)
Read
08
MIN
Image The Six Principles Behind GDPR (Giovanni Buttarelli, European Data Protection Supervisor)
Digital transformation
The Six Principles Behind GDPR (Giovanni Buttarelli, European Data Protection Supervisor)
Read
06
MIN