Image CIO and CISO: A Unique Partnership
Cybersecurity
06.11.25 Cybersecurity
CIO and CISO: A Unique Partnership
Read
04
MIN
Image The SIH Alliance Wants to Build the Hospital Information System of Tomorrow
Cybersecurity
05.28.25 Cybersecurity
The SIH Alliance Wants to Build the Hospital Information System of Tomorrow
Read
03
MIN
Image Operational Technology Cybersecurity: A Strategic and Priority for EDF
Cybersecurity
05.07.25 Cybersecurity
Operational Technology Cybersecurity: A Strategic and Priority for EDF
Read
05
MIN
Image NIS2: The challenge of scaling up
Cybersecurity
04.11.25 Cybersecurity
NIS2: The challenge of scaling up
Read
04
MIN
Image Zero Trust: A pragmatic approach beyond the buzzword
Cybersecurity
04.10.25 Cybersecurity
Zero Trust: A pragmatic approach beyond the buzzword
Read
10
MIN
Image DevSecOps and AI: how machine learning transforms the security approach
Cybersecurity
03.19.25 Cybersecurity
DevSecOps and AI: how machine learning transforms the security approach
Read
05
MIN
Image 2025, a decisive year for French cybersecurity
Cybersecurity
03.14.25 Cybersecurity
2025, a decisive year for French cybersecurity
Read
05
MIN
Image Universal ZTNA: Why access management needs rethinking
Cybersecurity
03.03.25 Cybersecurity
Universal ZTNA: Why access management needs rethinking
Read
06
MIN
Image Local Authorities in Disarray Against Cyber Risks
Cybersecurity
02.12.25 Cybersecurity
Local Authorities in Disarray Against Cyber Risks
Read
07
MIN
Image 2025: A key year for OSINT and cybersecurity
Cybersecurity
02.07.25 Cybersecurity
2025: A key year for OSINT and cybersecurity
Read
02
MIN
Image The Difficult Task of Protecting Health Data
Cybersecurity
02.04.25 Cybersecurity
The Difficult Task of Protecting Health Data
Read
07
MIN
Image European Cyber Cup: High-Caliber Partners
Cyber +
01.27.25 Cyber +
European Cyber Cup: High-Caliber Partners
Read
06
MIN
Image Using role-playing and gaming to train cybersecurity experts
Cyber +
01.21.25 Cyber +
Using role-playing and gaming to train cybersecurity experts
Read
03
MIN
Image Cyber maturity to protect investment and ensure profitability
Cyber +
01.14.25 Cyber +
Cyber maturity to protect investment and ensure profitability
Read
07
MIN
Image Investigation: the healthcare sector facing cyber risks
Cybersecurity
01.10.25 Cybersecurity
Investigation: the healthcare sector facing cyber risks
Read
10
MIN
Image Zero Trust, an ambitious but complex approach
Cybersecurity
01.07.25 Cybersecurity
Zero Trust, an ambitious but complex approach
Read
06
MIN
Image Yann Bonnet: "Reflections and Perspectives for Campus Cyber"
Cybersecurity
01.05.25 Cybersecurity
Yann Bonnet: “Reflections and Perspectives for Campus Cyber”
Read
09
MIN
Image 2024: Major cyberattacks  decoded
Cyber +
12.31.24 Cyber +
2024: Major cyberattacks decoded
Read
05
MIN
Image InsurTech and Cybersecurity: The New El Dorado?
Cybersecurity
12.30.24 Cybersecurity
InsurTech and Cybersecurity: The New El Dorado?
Read
06
MIN
Image Algorithms and filter bubbles: can we escape informational confinement?
Cybersecurity
12.09.24 Cybersecurity
Algorithms and filter bubbles: can we escape informational confinement?
Read
04
MIN
Image From cybersecurity to resilience: at the heart of REC, DORA & NIS 2 transpositions
Cybersecurity
12.03.24 Cybersecurity
From cybersecurity to resilience: at the heart of REC, DORA & NIS 2 transpositions
Read
05
MIN