Image Industrial cybersecurity: the need for IT/OT convergence
Industry and OT
09.05.23 Industry and OT
Industrial cybersecurity: the need for IT/OT convergence
Read
01
MIN
Image Messenger to implement default end-to-end encryption
Cybercrime
08.31.23 Cybercrime
Messenger to implement default end-to-end encryption
Read
02
MIN
Image Phishing attack uses QR code
Risks management
08.31.23 Risks management
Phishing attack uses QR code
Read
02
MIN
Image United States: generative AI not subject to copyright law
Digital transformation
United States: generative AI not subject to copyright law
Read
01
MIN
Image OSINT: Tips for keeping ourselves safe online
Digital transformation
OSINT: Tips for keeping ourselves safe online
Read
04
MIN
Image North Korean cybercriminals spied on Russian missile manufacturer
Cyber stability
08.28.23 Cyber stability
North Korean cybercriminals spied on Russian missile manufacturer
Read
01
MIN
Image Digital Services Act implemented for “very large platforms”
Digital Sovereignty
Digital Services Act implemented for “very large platforms”
Read
02
MIN
Image Understanding the DORA Directive in five points
Secops
08.21.23 Secops
Understanding the DORA Directive in five points
Read
05
MIN
Image Microsoft singled out in vulnerability patching
Secops
08.14.23 Secops
Microsoft singled out in vulnerability patching
Read
01
MIN
Image Negligence at Quebec Ministry of Cybersecurity
Digital transformation
Negligence at Quebec Ministry of Cybersecurity
Read
01
MIN
Image AI Deciphers Passwords from Keyboard Sounds
Risks management
08.14.23 Risks management
AI Deciphers Passwords from Keyboard Sounds
Read
01
MIN
Image Widespread Russian cyber espionage campaign on Microsoft Teams
Cyber stability
08.14.23 Cyber stability
Widespread Russian cyber espionage campaign on Microsoft Teams
Read
01
MIN
Image All change at Killnet: myth or reality?
Cybercrime
08.14.23 Cybercrime
All change at Killnet: myth or reality?
Read
04
MIN
Image Test yourself: How well are you protected against cyber extortion? Ransom Check Tool will show you
Risks management
08.10.23 Risks management
Test yourself: How well are you protected against cyber extortion? Ransom Check Tool will show you
Read
04
MIN
Image AI: a boon for social engineering
Risks management
08.07.23 Risks management
AI: a boon for social engineering
Read
07
MIN
Image 50 million dollars in crypto stolen from Curve
Cybercrime
08.04.23 Cybercrime
50 million dollars in crypto stolen from Curve
Read
01
MIN
Image Chinese “time bomb” in US Army computer systems?
Cyber stability
08.04.23 Cyber stability
Chinese “time bomb” in US Army computer systems?
Read
01
MIN
Image Canada: what legal framework is there for SOCMINT?
Secops
08.03.23 Secops
Canada: what legal framework is there for SOCMINT?
Read
05
MIN
Image AI Act: too constraining or too permissive?
Risks management
08.02.23 Risks management
AI Act: too constraining or too permissive?
Read
02
MIN
Image Digital Market Act update
Digital Sovereignty
Digital Market Act update
Read
01
MIN
Image Writing NIS2 Directive into French law
Digital Sovereignty
Writing NIS2 Directive into French law
Read
01
MIN