Image European Cyber Cup: High-Caliber Partners
Cyber +
01.27.25 Cyber +
European Cyber Cup: High-Caliber Partners
Read
06
MIN
Image DORA: A Structural Revolution is underway
Digital Sovereignty
DORA: A Structural Revolution is underway
Read
06
MIN
Image Using role-playing and gaming to train cybersecurity experts
Cyber +
01.21.25 Cyber +
Using role-playing and gaming to train cybersecurity experts
Read
03
MIN
Image How moderators can legally manage harmful content and online hate
Cyber +
01.16.25 Cyber +
How moderators can legally manage harmful content and online hate
Read
07
MIN
Image Data protection and privacy in data-driven policing
Cyber +
01.15.25 Cyber +
Data protection and privacy in data-driven policing
Read
07
MIN
Image Cyber maturity to protect investment and ensure profitability
Cyber +
01.14.25 Cyber +
Cyber maturity to protect investment and ensure profitability
Read
07
MIN
Image NIS2: Who stands to gain?
Digital transformation
NIS2: Who stands to gain?
Read
04
MIN
Image Investigation: the healthcare sector facing cyber risks
Cybersecurity
01.09.25 Cybersecurity
Investigation: the healthcare sector facing cyber risks
Read
10
MIN
Image North America’s Cybersecurity Talent Shortage Reaches Critical Levels
Cyber +
01.09.25 Cyber +
North America’s Cybersecurity Talent Shortage Reaches Critical Levels
Read
04
MIN
Image The Financial Aspects of Blockchain: Opportunities and Implications for the Financial Sector
Digital transformation
The Financial Aspects of Blockchain: Opportunities and Implications for the Financial Sector
Read
04
MIN
Image The Evolution and Future of Internet Decentralization
Digital transformation
The Evolution and Future of Internet Decentralization
Read
04
MIN
Image Zero Trust, an ambitious but complex approach
Cybersecurity
01.07.25 Cybersecurity
Zero Trust, an ambitious but complex approach
Read
06
MIN
Image Yann Bonnet: "Reflections and Perspectives for Campus Cyber"
Cybersecurity
01.05.25 Cybersecurity
Yann Bonnet: “Reflections and Perspectives for Campus Cyber”
Read
09
MIN
Image 2024: Major cyberattacks  decoded
Cyber +
12.31.24 Cyber +
2024: Major cyberattacks decoded
Read
05
MIN
Image InsurTech and Cybersecurity: The New El Dorado?
Cybersecurity
12.30.24 Cybersecurity
InsurTech and Cybersecurity: The New El Dorado?
Read
06
MIN
Image Defending against ransomware: advanced prevention and response techniques
Cybercrime
12.12.24 Cybercrime
Defending against ransomware: advanced prevention and response techniques
Read
07
MIN
Image Algorithms and filter bubbles: can we escape informational confinement?
Cybersecurity
12.09.24 Cybersecurity
Algorithms and filter bubbles: can we escape informational confinement?
Read
04
MIN
Image From cybersecurity to resilience: at the heart of REC, DORA & NIS 2 transpositions
Cybersecurity
12.03.24 Cybersecurity
From cybersecurity to resilience: at the heart of REC, DORA & NIS 2 transpositions
Read
05
MIN
Image Russian State-sponsored cybercriminals exploited 0-Day vulnerabilities in Firefox and Windows
Cyber stability
12.02.24 Cyber stability
Russian State-sponsored cybercriminals exploited 0-Day vulnerabilities in Firefox and Windows
Read
01
MIN
Image Digital Identity at risk: lessons from repeated data breaches
Cybersecurity
11.29.24 Cybersecurity
Digital Identity at risk: lessons from repeated data breaches
Read
05
MIN
Image The CISO of tomorrow: preparing for the worst in the age of AI and increasingly complex cyber threats
Cybersecurity
11.22.24 Cybersecurity
The CISO of tomorrow: preparing for the worst in the age of AI and increasingly complex cyber threats
Read
04
MIN