Image The BISO: an operational bridge between cybersecurity and business lines
Cyber +
12.11.25 Cyber +
The BISO: an operational bridge between cybersecurity and business lines
Read
04
MIN
Image [The Roads of Surveillance]: Investigation into the Global Market for Spyware / [Episode 0]
Cyber +
12.08.25 Cyber +
The Roads of Surveillance: Investigation into the Global Market for Spyware / Episode 0
Read
14
MIN
Image Iran: between isolation and technological resilience
Digital transformation
Iran: between isolation and technological resilience
Read
04
MIN
Image Israel–Palestine War: the space sector targeted by hacktivists
Risks management
12.01.25 Risks management
Israel–Palestine War: the space sector targeted by hacktivists
Read
02
MIN
Image AI-Powered Browsers Create New Vulnerabilities
Risks management
12.01.25 Risks management
AI-Powered Browsers Create New Vulnerabilities
Read
07
MIN
Image SBOM: From Regulatory Constraint to Cornerstone of Software Security
Cybersecurity
11.27.25 Cybersecurity
SBOM: From Regulatory Constraint to Cornerstone of Software Security
Read
07
MIN
Image Kimsuky: Pyongyang’s Eye in Seoul’s Mailbox
Cybercrime
11.25.25 Cybercrime
Kimsuky: Pyongyang’s Eye in Seoul’s Mailbox
Read
06
MIN
Image Éric Singer, CISO at Ingenico, a craftsman of digital trust
Cybersecurity
11.21.25 Cybersecurity
Éric Singer, CISO at Ingenico, a craftsman of digital trust
Read
04
MIN
Image Shani Benoualid, Ambassador of the Trust & Safety Forum: “Europe has regulation, but not yet the ecosystem”
Cyber +
11.18.25 Cyber +
Shani Benoualid, Ambassador of the Trust & Safety Forum: “Europe has regulation, but not yet the ecosystem”
Read
07
MIN
Image Cloud Sovereignty: How Berlin and Paris Are Trying to Draw a European Line
Digital Sovereignty
Cloud Sovereignty: How Berlin and Paris Are Trying to Draw a European Line
Read
14
MIN
Image Cloud Sovereignty Framework: when the devil is in the details
Digital Sovereignty
Cloud Sovereignty Framework: when the devil is in the details
Read
04
MIN
Image Cyber Risk Quantification (CRQ): Deciphering Financial Exposure to Better Prioritize Cybersecurity Investments
Cybersecurity
11.12.25 Cybersecurity
Cyber Risk Quantification (CRQ): Deciphering Financial Exposure to Better Prioritize Cybersecurity Investments
Read
09
MIN
Image The FIGs: An economic power serving U.S. tech?
Digital Sovereignty
The FIGs: An economic power serving U.S. tech?
Read
06
MIN
Image From Factory of the World to Tech Giant: The Drivers of China’s Rise
Digital transformation
From Factory of the World to Tech Giant: The Drivers of China’s Rise
Read
06
MIN
Image How GPS jamming works and how to guard against it
Cyber +
10.21.25 Cyber +
How GPS jamming works and how to guard against it
Read
06
MIN
Image European Cybersecurity Reserve: The Union Builds a Common Shield
Cybersecurity
10.20.25 Cybersecurity
European Cybersecurity Reserve: The Union Builds a Common Shield
Read
04
MIN
Image Troll Farms: The Mercenaries of Online Disinformation?
Cybercrime
10.19.25 Cybercrime
Troll Farms: The Mercenaries of Online Disinformation?
Read
06
MIN
Image SMEs and Mid-Sized Companies: How to Structure a Cybersecurity Policy
Cybersecurity
10.17.25 Cybersecurity
SMEs and Mid-Sized Companies: How to Structure a Cybersecurity Policy
Read
04
MIN
Image Stéphane Tournadre, CISO of Servier Group, a builder of digital fortresses
Cybersecurity
10.16.25 Cybersecurity
Stéphane Tournadre, CISO of Servier Group, a builder of digital fortresses
Read
04
MIN
Image INCYBER Forum Canada 2025: Digital sovereignty at the heart of cybersecurity
Cybersecurity
10.14.25 Cybersecurity
INCYBER Forum Canada 2025: Digital sovereignty at the heart of cybersecurity
Read
04
MIN
Image In the event of a cyber crisis: who to turn to?
Cybersecurity
10.01.25 Cybersecurity
In the event of a cyber crisis: who to turn to?
Read
05
MIN