Image Analysis of HTTPS Traffic: Ending the Gridlock (By Pierre-David Vignolle and Martine Ricouart-Maillet, BRM Avocats)
Secops
11.14.16 Secops
Analysis of HTTPS Traffic: Ending the Gridlock (By Pierre-David Vignolle and Martine Ricouart-Maillet, BRM Avocats)
Read
07
MIN
Image Trends in the technologies of detection and response to cyber attacks - By Helmi RAIS, Senior Manager at Alliacom and Team Manager of AlliaCERT
Secops
10.17.16 Secops
Trends in the technologies of detection and response to cyber attacks – By Helmi RAIS, Senior Manager at Alliacom and Team Manager of AlliaCERT
Read
07
MIN
Image Incident Response: How far can automatisation go ?
Secops
09.19.16 Secops
Incident Response: How far can automatisation go ?
Read
01
MIN
Image CYBER SECURITY: THE NEW BUSINESS PRIORITY FACING EXECUTIVES - By Dr Arthur M. Langer, Columbia University
Secops
09.01.16 Secops
CYBER SECURITY: THE NEW BUSINESS PRIORITY FACING EXECUTIVES – By Dr Arthur M. Langer, Columbia University
Read
14
MIN
Image Cybersecurity video of the month: "would you trust this man?" by Paypal
Secops
07.12.16 Secops
Cybersecurity video of the month: “would you trust this man?” by Paypal
Read
01
MIN
Image Cybersecurity, Cyril Hanouna and the alien effect [by Clément Rossi, CEIS]
Secops
05.02.16 Secops
Cybersecurity, Cyril Hanouna and the alien effect by Clément Rossi, CEIS
Read
08
MIN
Image Dealing with spam: a technical & organizational approach [by Charles Ibrahim]
Secops
01.06.16 Secops
Dealing with spam: a technical & organizational approach by Charles Ibrahim
Read
10
MIN
Image Cyber Attacks : Crisis Recovery and Anticipated Measures [by Daniel Guinier, Expert in cybercrime and financial crimes for the International Criminal Court in The Hague]
Secops
12.31.15 Secops
Cyber Attacks : Crisis Recovery and Anticipated Measures by Daniel Guinier, Expert in cybercrime and financial crimes for the International Criminal Court in The Hague
Read
13
MIN
Image An Ecosystem for Private Customer Data Management [by Harald Gjermundrød, Département of Computer Science, University of Nicosia, Cyprus]
Secops
12.31.15 Secops
An Ecosystem for Private Customer Data Management by Harald Gjermundrød, Département of Computer Science, University of Nicosia, Cyprus
Read
13
MIN
Image Dematerialisation represents an important step towards greater trust, greater fluidity, greater accessibility and greater security in digital affairs in Europe. [by Jean-Marc Rietsch, international dematerialisation expert]
Secops
10.15.15 Secops
Dematerialisation represents an important step towards greater trust, greater fluidity, greater accessibility and greater security in digital affairs in Europe. by Jean-Marc Rietsch, international dematerialisation expert
Read
03
MIN
Image The Security of Executives: A Challenge for CISOs [by Guillaume Tissier, CEIS]
Secops
09.09.15 Secops
The Security of Executives: A Challenge for CISOs by Guillaume Tissier, CEIS
Read
08
MIN
Image The Economics of Cybersecurity: Drawing Inspiration from Insurance to Fight Against Market Biases [by Maxime ALAY-EDDINE, Cyberwatch SAS
Secops
09.08.15 Secops
The Economics of Cybersecurity: Drawing Inspiration from Insurance to Fight Against Market Biases [by Maxime ALAY-EDDINE, Cyberwatch SAS
Read
11
MIN
Image Healthcare Data Security: 'I' Well Before 'C' [by Cédric Cartau, CISO of Nantes Hospital]
Secops
08.03.15 Secops
Healthcare Data Security: ‘I’ Well Before ‘C’ by Cédric Cartau, CISO of Nantes Hospital
Read
07
MIN
Image The quest for reliable and secure source code [by Sebastien Giora, Advens]
Secops
07.02.15 Secops
The quest for reliable and secure source code by Sebastien Giora, Advens
Read
04
MIN
Image The risk of a major flood in the the Ile-de-France region is also a challenge in terms of Information Systems Security [by Vincent Balouet, maitrisedesrisques.com]
Secops
05.12.15 Secops
The risk of a major flood in the the Ile-de-France region is also a challenge in terms of Information Systems Security by Vincent Balouet, maitrisedesrisques.com
Read
10
MIN
Image The Sony Pictures Entertainment Case : The employees’ low-profile initiative
Secops
01.15.15 Secops
The Sony Pictures Entertainment Case : The employees’ low-profile initiative
Read
01
MIN
Image [Contribution] Evolve or Die: Security Adaptation in a Virtual World [by Bitdefender]
Secops
01.05.15 Secops
Contribution Evolve or Die: Security Adaptation in a Virtual World by Bitdefender
Read
02
MIN
Image [Contribution] Whitenoise, Dynamic Identity Verification and Authentication and Dynamic Distributed Key Infrastructures [by André Jacques Brisson, Whitenoise Laboratories Canada Inc]
Secops
01.05.15 Secops
Contribution Whitenoise, Dynamic Identity Verification and Authentication and Dynamic Distributed Key Infrastructures by André Jacques Brisson, Whitenoise Laboratories Canada Inc
Read
10
MIN
Image Are you ready for the next attack? [By Symantec]
Secops
12.23.14 Secops
Are you ready for the next attack? By Symantec
Read
05
MIN
Image The cyber attack potential assessment database [By Thierry Autret, GIE Cartes bancaires]
Secops
12.23.14 Secops
The cyber attack potential assessment database By Thierry Autret, GIE Cartes bancaires
Read
04
MIN
Image Dynamic Identity Verification and Authentication (DIVA) [by André Jacques Brisson, Whitenoise Laboratories Canada Inc.]
Secops
11.21.14 Secops
Dynamic Identity Verification and Authentication (DIVA) by André Jacques Brisson, Whitenoise Laboratories Canada Inc.
Read
10
MIN