Image Hardware and software obsolescence: a real resilience issue
Risks management
11.17.21 Risks management
Hardware and software obsolescence: a real resilience issue
Read
01
MIN
Image How to mitigate crypto risks with the right data-driven compliance strategy?
Cybercrime
11.16.21 Cybercrime
How to mitigate crypto risks with the right data-driven compliance strategy?
Read
01
MIN
Image FBI mail server hacked by ethical hacker
Cyber stability
11.15.21 Cyber stability
FBI mail server hacked by ethical hacker
Read
01
MIN
Image Nozomi Networks' survey
Industry and OT
10.15.21 Industry and OT
Nozomi Networks’ survey
Read
01
MIN
Image Facebook: a major outage
Risks management
10.15.21 Risks management
Facebook: a major outage
Read
02
MIN
Image Vulnerabilities: the central issue of governance
Cybercrime
10.14.21 Cybercrime
Vulnerabilities: the central issue of governance
Read
05
MIN
Image The transmission of information to the intelligence services
Cyber stability
08.16.21 Cyber stability
The transmission of information to the intelligence services
Read
05
MIN
Image Regulating the digital space: an effort for all?
Cyber stability
08.12.21 Cyber stability
Regulating the digital space: an effort for all?
Read
04
MIN
Image Crypto-assets – New technologies can help combat AML/CFT
Cybercrime
07.27.21 Cybercrime
Crypto-assets – New technologies can help combat AML/CFT
Read
08
MIN
Image Cybersecurity: CISOs at the heart of the action
Digital transformation
Cybersecurity: CISOs at the heart of the action
Read
06
MIN
Image “The question is no longer whether we can fall but how to overcome such an event”
Cybercrime
06.28.21 Cybercrime
“The question is no longer whether we can fall but how to overcome such an event”
Read
05
MIN
Image CFI, a new FIC offshoot dedicated to the security of operational technologies
Digital transformation
CFI, a new FIC offshoot dedicated to the security of operational technologies
Read
03
MIN
Image Resilience of critical infrastructures: A sovereignty issue
Cyber stability
06.24.21 Cyber stability
Resilience of critical infrastructures: A sovereignty issue
Read
04
MIN
Image Almost 80% of cyber security incidents involve a DNS query
Risks management
05.31.21 Risks management
Almost 80% of cyber security incidents involve a DNS query
Read
04
MIN
Image Who In The World Is Tristan?
Risks management
12.07.20 Risks management
Who In The World Is Tristan?
Read
04
MIN
Image Obs Breakfast: “Cybersecurity, an asset in corporate communication and marketing?”
Cybercrime
10.30.20 Cybercrime
Obs Breakfast: “Cybersecurity, an asset in corporate communication and marketing?”
Read
02
MIN
Image Presentation of the EBIOS Risk Manager method
Risks management
03.05.20 Risks management
Presentation of the EBIOS Risk Manager method
Read
06
MIN
Image Making Humans the Strong Link in the IS Defence Chain (by Cyril Bras, CISO, Grenoble-Alpes Métropole)
Risks management
01.22.20 Risks management
Making Humans the Strong Link in the IS Defence Chain (by Cyril Bras, CISO, Grenoble-Alpes Métropole)
Read
04
MIN
Image Idiap becomes first non-US site of the Center for Identification Technology Research
Risks management
12.20.19 Risks management
Idiap becomes first non-US site of the Center for Identification Technology Research
Read
03
MIN
Image The effects of a data breach: Loss of brand reputation and financial penalties (by Seref Can OZKAYA)
Risks management
12.03.19 Risks management
The effects of a data breach: Loss of brand reputation and financial penalties (by Seref Can OZKAYA)
Read
07
MIN
Image A Release of Digital Hostages?
Risks management
10.28.19 Risks management
A Release of Digital Hostages?
Read
05
MIN