Image From theory to practice: Belgium’s experience implementing the NIS2 directive
Cybersecurity
03.02.26 Cybersecurity
From theory to practice: Belgium’s experience implementing the NIS2 directive
Read
08
MIN
Image Hyper-Volumetric DDoS Attacks: The Threat Reaches a New Scale
Cybercrime
01.15.26 Cybercrime
Hyper-Volumetric DDoS Attacks: The Threat Reaches a New Scale
Read
07
MIN
Image [Roads of surveillance] Episode 3: Israel – Global Hub of Cyber Offense
Cybersecurity
01.09.26 Cybersecurity
Roads of surveillance Episode 3: Israel – Global Hub of Cyber Offense
Read
13
MIN
Image SBOM: From Regulatory Constraint to Cornerstone of Software Security
Cybersecurity
11.27.25 Cybersecurity
SBOM: From Regulatory Constraint to Cornerstone of Software Security
Read
07
MIN
Image Éric Singer, CISO at Ingenico, a craftsman of digital trust
Cybersecurity
11.21.25 Cybersecurity
Éric Singer, CISO at Ingenico, a craftsman of digital trust
Read
04
MIN
Image Cyber Risk Quantification (CRQ): Deciphering Financial Exposure to Better Prioritize Cybersecurity Investments
Cybersecurity
11.12.25 Cybersecurity
Cyber Risk Quantification (CRQ): Deciphering Financial Exposure to Better Prioritize Cybersecurity Investments
Read
09
MIN
Image European Cybersecurity Reserve: The Union Builds a Common Shield
Cybersecurity
10.20.25 Cybersecurity
European Cybersecurity Reserve: The Union Builds a Common Shield
Read
04
MIN
Image SMEs and Mid-Sized Companies: How to Structure a Cybersecurity Policy
Cybersecurity
10.17.25 Cybersecurity
SMEs and Mid-Sized Companies: How to Structure a Cybersecurity Policy
Read
04
MIN
Image Stéphane Tournadre, CISO of Servier Group, a builder of digital fortresses
Cybersecurity
10.16.25 Cybersecurity
Stéphane Tournadre, CISO of Servier Group, a builder of digital fortresses
Read
04
MIN
Image INCYBER Forum Canada 2025: Digital sovereignty at the heart of cybersecurity
Cybersecurity
10.14.25 Cybersecurity
INCYBER Forum Canada 2025: Digital sovereignty at the heart of cybersecurity
Read
04
MIN
Image In the event of a cyber crisis: who to turn to?
Cybersecurity
10.01.25 Cybersecurity
In the event of a cyber crisis: who to turn to?
Read
05
MIN
Image GLIMPS: A French Success Story in North America
Cybersecurity
06.30.25 Cybersecurity
GLIMPS: A French Success Story in North America
Read
03
MIN
Image CIO and CISO: A Unique Partnership
Cybersecurity
06.11.25 Cybersecurity
CIO and CISO: A Unique Partnership
Read
04
MIN
Image The SIH Alliance Wants to Build the Hospital Information System of Tomorrow
Cybersecurity
05.28.25 Cybersecurity
The SIH Alliance Wants to Build the Hospital Information System of Tomorrow
Read
03
MIN
Image Operational Technology Cybersecurity: A Strategic and Priority for EDF
Cybersecurity
05.07.25 Cybersecurity
Operational Technology Cybersecurity: A Strategic and Priority for EDF
Read
05
MIN
Image NIS2: The challenge of scaling up
Cybersecurity
04.11.25 Cybersecurity
NIS2: The challenge of scaling up
Read
04
MIN
Image Zero Trust: A pragmatic approach beyond the buzzword
Cybersecurity
04.10.25 Cybersecurity
Zero Trust: A pragmatic approach beyond the buzzword
Read
10
MIN
Image DevSecOps and AI: how machine learning transforms the security approach
Cybersecurity
03.19.25 Cybersecurity
DevSecOps and AI: how machine learning transforms the security approach
Read
05
MIN
Image 2025, a decisive year for French cybersecurity
Cybersecurity
03.14.25 Cybersecurity
2025, a decisive year for French cybersecurity
Read
05
MIN
Image Universal ZTNA: Why access management needs rethinking
Cybersecurity
03.03.25 Cybersecurity
Universal ZTNA: Why access management needs rethinking
Read
06
MIN
Image Local Authorities in Disarray Against Cyber Risks
Cybersecurity
02.12.25 Cybersecurity
Local Authorities in Disarray Against Cyber Risks
Read
07
MIN