Image CNIL and AI: Understand, Support and Control
Cyber stability
04.23.24 Cyber stability
CNIL and AI: Understand, Support and Control
Read
07
MIN
Image Drafting an ISSP: Employees Highlight Management’s Lack of Involvement
Secops
04.17.24 Secops
Drafting an ISSP: Employees Highlight Management’s Lack of Involvement
Read
03
MIN
Image Russia's offensive on "digital sovereignty" in Africa
Cyber stability
04.12.24 Cyber stability
Russia’s offensive on “digital sovereignty” in Africa
Read
06
MIN
Image Child privacy and protection: finding the right balance in the fight against dangerous sexual content
Risks management
04.09.24 Risks management
Child privacy and protection: finding the right balance in the fight against dangerous sexual content
Read
04
MIN
Image PhilosoFIC:are generative algorithms accelerators or the gravediggers of human intelligence?
Digital transformation
PhilosoFIC:are generative algorithms accelerators or the gravediggers of human intelligence?
Read
06
MIN
Image Jean-Jacques Latour: "To date, we have not identified any new threat linked to artificial intelligence"
Risks management
03.18.24 Risks management
Jean-Jacques Latour: “To date, we have not identified any new threat linked to artificial intelligence”
Read
06
MIN
Image Grand Est : a dynamic, structured ecosystem
Cybersecurity
03.15.24 Cybersecurity
Grand Est : a dynamic, structured ecosystem
Read
05
MIN
Image Storage must form the core of an enterprise cybersecurity strategy
Risks management
03.14.24 Risks management
Storage must form the core of an enterprise cybersecurity strategy
Read
05
MIN
Image Cybersecurity specialist: a profession under mounting pressure
Digital transformation
Cybersecurity specialist: a profession under mounting pressure
Read
07
MIN
Image Cloud Sprawl Is Making Businesses Vulnerable to Cyberattacks
Secops
03.11.24 Secops
Cloud Sprawl Is Making Businesses Vulnerable to Cyberattacks
Read
05
MIN
Image Canada: town of Hamilton acknowledges ransomware attack 
Cybercrime
03.08.24 Cybercrime
Canada: town of Hamilton acknowledges ransomware attack 
Read
01
MIN
Image Government administration: France and Germany join forces to develop sovereign tools
Digital Sovereignty
Government administration: France and Germany join forces to develop sovereign tools
Read
02
MIN
Image Israel-Hamas cyberwar : Google emphasizes key role of Iran
Cyber stability
03.05.24 Cyber stability
Israel-Hamas cyberwar : Google emphasizes key role of Iran
Read
02
MIN
Image Nuclear power: EDF entrusts part of its cloud to AWS
Digital Sovereignty
Nuclear power: EDF entrusts part of its cloud to AWS
Read
02
MIN
Image iMessage, Bing and Edge will not be subject to DMA
Digital Sovereignty
iMessage, Bing and Edge will not be subject to DMA
Read
02
MIN
Image Russian intelligence agent at the heart of cybercriminal forum
Cybercrime
03.05.24 Cybercrime
Russian intelligence agent at the heart of cybercriminal forum
Read
02
MIN
Image Law enforcement from eleven countries take LockBit offline
Cybercrime
03.05.24 Cybercrime
Law enforcement from eleven countries take LockBit offline
Read
02
MIN
Image ECHR defends conversation encryption
Digital transformation
ECHR defends conversation encryption
Read
02
MIN
Image Tech giants make commitment against political deepfakes
Risks management
03.05.24 Risks management
Tech giants make commitment against political deepfakes
Read
02
MIN
Image Vulnerability identified in Rhysida ransomware
Risks management
03.05.24 Risks management
Vulnerability identified in Rhysida ransomware
Read
02
MIN
Image State-sponsored cybercriminals using ChatGPT
Risks management
03.04.24 Risks management
State-sponsored cybercriminals using ChatGPT
Read
01
MIN