Image CFI, a new FIC offshoot dedicated to the security of operational technologies
Digital transformation
CFI, a new FIC offshoot dedicated to the security of operational technologies
Read
03
MIN
Image Resilience of critical infrastructures: A sovereignty issue
Cyber stability
06.24.21 Cyber stability
Resilience of critical infrastructures: A sovereignty issue
Read
04
MIN
Image Almost 80% of cyber security incidents involve a DNS query
Risks management
05.31.21 Risks management
Almost 80% of cyber security incidents involve a DNS query
Read
04
MIN
Image Who In The World Is Tristan?
Risks management
12.07.20 Risks management
Who In The World Is Tristan?
Read
04
MIN
Image Obs Breakfast: “Cybersecurity, an asset in corporate communication and marketing?”
Cybercrime
10.30.20 Cybercrime
Obs Breakfast: “Cybersecurity, an asset in corporate communication and marketing?”
Read
02
MIN
Image Presentation of the EBIOS Risk Manager method
Risks management
03.05.20 Risks management
Presentation of the EBIOS Risk Manager method
Read
06
MIN
Image Making Humans the Strong Link in the IS Defence Chain (by Cyril Bras, CISO, Grenoble-Alpes Métropole)
Risks management
01.22.20 Risks management
Making Humans the Strong Link in the IS Defence Chain (by Cyril Bras, CISO, Grenoble-Alpes Métropole)
Read
04
MIN
Image Idiap becomes first non-US site of the Center for Identification Technology Research
Risks management
12.20.19 Risks management
Idiap becomes first non-US site of the Center for Identification Technology Research
Read
03
MIN
Image The effects of a data breach: Loss of brand reputation and financial penalties (by Seref Can OZKAYA)
Risks management
12.03.19 Risks management
The effects of a data breach: Loss of brand reputation and financial penalties (by Seref Can OZKAYA)
Read
07
MIN
Image A Release of Digital Hostages?
Risks management
10.28.19 Risks management
A Release of Digital Hostages?
Read
05
MIN
Image New version of the digital risk awareness kit of Cybermalveillance.gouv.fr
Risks management
07.25.19 Risks management
New version of the digital risk awareness kit of Cybermalveillance.gouv.fr
Read
02
MIN
Image Artificial Intelligence: A "Game Changer" for Cyber Defence
Risks management
06.28.18 Risks management
Artificial Intelligence: A “Game Changer” for Cyber Defence
Read
08
MIN
Image Sporting Events and New Technologies: Opportunities and Threats (By Vincent Riou, CEIS)
Cybercrime
03.21.18 Cybercrime
Sporting Events and New Technologies: Opportunities and Threats (By Vincent Riou, CEIS)
Read
08
MIN
Image Vulnerability management: act before it is too late (By Sergio Loureiro, SecludIT)
Risks management
01.13.18 Risks management
Vulnerability management: act before it is too late (By Sergio Loureiro, SecludIT)
Read
04
MIN
Image Selective Malware: A New Cyber Weapon? (By Clémence Le Liepvre, CEIS)
Cybercrime
01.13.18 Cybercrime
Selective Malware: A New Cyber Weapon? (By Clémence Le Liepvre, CEIS)
Read
07
MIN
Image From Safety to Cybersecurity (Frédéric Cuppens and Nora Cuppens, IMT Atlantique)
Risks management
01.13.18 Risks management
From Safety to Cybersecurity (Frédéric Cuppens and Nora Cuppens, IMT Atlantique)
Read
06
MIN
Image Cyber Governance: Incentive Policies for Coordinated Vulnerability Disclosure (By Guillaume Vassault-Houlière, YesWeHack)
Risks management
11.28.17 Risks management
Cyber Governance: Incentive Policies for Coordinated Vulnerability Disclosure (By Guillaume Vassault-Houlière, YesWeHack)
Read
04
MIN
Image Insurance — Challenges of New Partnerships Between Insurers and IT Service Companies (By Bertrand Boutoille)
Risks management
11.28.17 Risks management
Insurance — Challenges of New Partnerships Between Insurers and IT Service Companies (By Bertrand Boutoille)
Read
03
MIN
Image Why Are We Still Talking About ‘Women in Cyber Security’? (Laura Brent, NATO)
Risks management
10.26.17 Risks management
Why Are We Still Talking About ‘Women in Cyber Security’? (Laura Brent, NATO)
Read
06
MIN
Image The Cloud: A Weapon of Mass Seduction for Cybercriminals (By Vincent Riou, Bluecyforce)
Risks management
09.26.17 Risks management
The Cloud: A Weapon of Mass Seduction for Cybercriminals (By Vincent Riou, Bluecyforce)
Read
05
MIN
Image Cybersecurity: A Field Where an Alliance Makes a Difference (By Eric Monnoyer, INOP's)
Risks management
01.19.17 Risks management
Cybersecurity: A Field Where an Alliance Makes a Difference (By Eric Monnoyer, INOP’s)
Read
03
MIN