Image From Compliance to Transformation: The Cybersecurity Turning Point for European Companies
Digital Sovereignty
From Compliance to Transformation: The Cybersecurity Turning Point for European Companies
Read
04
MIN
Image Operational Technology Cybersecurity: A Strategic and Priority for EDF
Cybersecurity
05.07.25 Cybersecurity
Operational Technology Cybersecurity: A Strategic and Priority for EDF
Read
05
MIN
Image Between tech and Trump: a Love-Hate relationship
Cyber stability
04.29.25 Cyber stability
Between tech and Trump: a Love-Hate relationship
Read
07
MIN
Image Military Operations and AI: What Role for Humans in the Decision-Making Loop?
Cyber stability
04.15.25 Cyber stability
Military Operations and AI: What Role for Humans in the Decision-Making Loop?
Read
05
MIN
Image Security requirements for connected products: the disruption brought by the Cyber Resilience Act
Cyber stability
04.14.25 Cyber stability
Security requirements for connected products: the disruption brought by the Cyber Resilience Act
Read
07
MIN
Image NIS2: The challenge of scaling up
Cybersecurity
04.11.25 Cybersecurity
NIS2: The challenge of scaling up
Read
04
MIN
Image Zero Trust: A pragmatic approach beyond the buzzword
Cybersecurity
04.10.25 Cybersecurity
Zero Trust: A pragmatic approach beyond the buzzword
Read
10
MIN
Image How to restore trust in a troubled world
Cyber stability
04.04.25 Cyber stability
How to restore trust in a troubled world
Read
06
MIN
Image InCyber Defense: At the Heart of European Cyber Commands
Cyber stability
03.20.25 Cyber stability
InCyber Defense: At the Heart of European Cyber Commands
Read
12
MIN
Image DevSecOps and AI: how machine learning transforms the security approach
Cybersecurity
03.19.25 Cybersecurity
DevSecOps and AI: how machine learning transforms the security approach
Read
05
MIN
Image 2025, a decisive year for French cybersecurity
Cybersecurity
03.14.25 Cybersecurity
2025, a decisive year for French cybersecurity
Read
05
MIN
Image ZERO DAY or "computing, the worm in the fruit of our modern societies?"
Cyber +
03.05.25 Cyber +
ZERO DAY or “computing, the worm in the fruit of our modern societies?”
Read
09
MIN
Image Universal ZTNA: Why access management needs rethinking
Cybersecurity
03.03.25 Cybersecurity
Universal ZTNA: Why access management needs rethinking
Read
06
MIN
Image Cybersecurity: What if we learned by playing? Four experts testify
Cyber +
02.25.25 Cyber +
Cybersecurity: What if we learned by playing? Four experts testify
Read
10
MIN
Image Challenge or Opportunity: Should Chinese Tech Be Concerned About Donald Trump's Return?
Cyber stability
02.21.25 Cyber stability
Challenge or Opportunity: Should Chinese Tech Be Concerned About Donald Trump’s Return?
Read
07
MIN
Image Social Networks: The End of Fact-Checking Disrupts Moderation Policies
Digital Sovereignty
Social Networks: The End of Fact-Checking Disrupts Moderation Policies
Read
07
MIN
Image Local Authorities in Disarray Against Cyber Risks
Cybersecurity
02.12.25 Cybersecurity
Local Authorities in Disarray Against Cyber Risks
Read
07
MIN
Image 2025: A key year for OSINT and cybersecurity
Cybersecurity
02.07.25 Cybersecurity
2025: A key year for OSINT and cybersecurity
Read
02
MIN
Image DeepSeek: A Shockwave for Global Artificial Intelligence
Digital transformation
DeepSeek: A Shockwave for Global Artificial Intelligence
Read
04
MIN
Image Building a Trustworthy Environment: Zero Trust Model Deciphered
Cyber stability
01.30.25 Cyber stability
Building a Trustworthy Environment: Zero Trust Model Deciphered
Read
05
MIN
Image From misinformation to resilience: teaching open-source investigation for a better future
Cyber stability
01.29.25 Cyber stability
From misinformation to resilience: teaching open-source investigation for a better future
Read
07
MIN