Image Data erasure: a resilient process
Secops
11.18.21 Secops
Data erasure: a resilient process
Read
03
MIN
Image Security breaches: Joe Biden's ultimatum to federal agencies
Secops
11.10.21 Secops
Security breaches: Joe Biden’s ultimatum to federal agencies
Read
01
MIN
Image Airbus CyberSecurity and Alstom signed a partnership
Digital transformation
Airbus CyberSecurity and Alstom signed a partnership
Read
01
MIN
Image Thales strengthens its cooperation with Microsoft Azure
Industry and OT
10.15.21 Industry and OT
Thales strengthens its cooperation with Microsoft Azure
Read
01
MIN
Image Nozomi Networks' survey
Industry and OT
10.15.21 Industry and OT
Nozomi Networks’ survey
Read
01
MIN
Image Facebook: a major outage
Risks management
10.15.21 Risks management
Facebook: a major outage
Read
02
MIN
Image Finding your way through cybersecurity assessments
Secops
10.14.21 Secops
Finding your way through cybersecurity assessments
Read
05
MIN
Image Due Diligence : a Core Principle in the Fight against Ransomware and Cybercrime
Secops
08.23.21 Secops
Due Diligence : a Core Principle in the Fight against Ransomware and Cybercrime
Read
22
MIN
Image Security for SMEs and ETIs from a CISO’s point of view
Secops
08.12.21 Secops
Security for SMEs and ETIs from a CISO’s point of view
Read
05
MIN
Image Cybersecurity: CISOs at the heart of the action
Digital transformation
Cybersecurity: CISOs at the heart of the action
Read
06
MIN
Image European Cyber Security School to train cyber security technicians and operators
Digital transformation
European Cyber Security School to train cyber security technicians and operators
Read
02
MIN
Image 2020: A record year for data leaks
Cybercrime
07.07.21 Cybercrime
2020: A record year for data leaks
Read
06
MIN
Image Who In The World Is Tristan?
Risks management
12.07.20 Risks management
Who In The World Is Tristan?
Read
04
MIN
Image Interview of Abeer Khedr, Information Security Director
Secops
11.02.20 Secops
Interview of Abeer Khedr, Information Security Director
Read
01
MIN
Image Continuous Improvement: How do Counterproductive Routines Linger On In Security "best practices"?
Secops
04.09.20 Secops
Continuous Improvement: How do Counterproductive Routines Linger On In Security “best practices”?
Read
06
MIN
Image Ransomware in Six Questions
Secops
01.22.20 Secops
Ransomware in Six Questions
Read
03
MIN
Image Business Email Compromise: A scourge with a no-brainer defense (by Klara Jordan, Global Cybersecurity Alliance & Rois Ni Thuama, Redsift)
Secops
01.22.20 Secops
Business Email Compromise: A scourge with a no-brainer defense (by Klara Jordan, Global Cybersecurity Alliance & Rois Ni Thuama, Redsift)
Read
07
MIN
Image Using differential privacy to protect privacy
Secops
12.20.19 Secops
Using differential privacy to protect privacy
Read
05
MIN
Image CYBERSECURITY, AN ISSUE THAT MUST BE SHARED AT ALL LEVELS OF HIERARCHY
Cyber stability
03.21.18 Cyber stability
CYBERSECURITY, AN ISSUE THAT MUST BE SHARED AT ALL LEVELS OF HIERARCHY
Read
01
MIN
Image Cyberprotection of Industrial Control Systems: a Model-Based Approach to Detect and Respond to Cyberattacks
Secops
03.21.18 Secops
Cyberprotection of Industrial Control Systems: a Model-Based Approach to Detect and Respond to Cyberattacks
Read
08
MIN
Image The maritime industry and cyber risk (by Brice Ducoum, Groupe EYSSAUTIER)
Digital Sovereignty
The maritime industry and cyber risk (by Brice Ducoum, Groupe EYSSAUTIER)
Read
05
MIN