Image From WarGames to Mr. Robot: when hackers take over the big and small screens
Cybercrime
09.02.22 Cybercrime
From WarGames to Mr. Robot: when hackers take over the big and small screens
Read
07
MIN
Image Ukraine: a Cyber War Story
Cyber stability
09.02.22 Cyber stability
Ukraine: a Cyber War Story
Read
05
MIN
Image The French are aware of cyber risks but… are they truly responsible?
Risks management
08.03.22 Risks management
The French are aware of cyber risks but… are they truly responsible?
Read
06
MIN
Image Local authorities in the face of cybercrime
Risks management
08.03.22 Risks management
Local authorities in the face of cybercrime
Read
06
MIN
Image The long march towards corporate digital responsibility
Digital transformation
The long march towards corporate digital responsibility
Read
08
MIN
Image Health, a sector under high (cyber) tension
Risks management
08.03.22 Risks management
Health, a sector under high (cyber) tension
Read
08
MIN
Image How can industrial companies ensure the cybersecurity of their supply chain?
Industry and OT
07.25.22 Industry and OT
How can industrial companies ensure the cybersecurity of their supply chain?
Read
07
MIN
Image Biometric authentication: a model to follow?
Digital identity
07.25.22 Digital identity
Biometric authentication: a model to follow?
Read
06
MIN
Image Cyberattacks: a month after declaring a state of emergency, what is the situation in Costa Rica?
Cyber stability
07.11.22 Cyber stability
Cyberattacks: a month after declaring a state of emergency, what is the situation in Costa Rica?
Read
06
MIN
Image The Rise of Mobile Malware
Cybercrime
07.04.22 Cybercrime
The Rise of Mobile Malware
Read
06
MIN
Image European cyber sovereignty: dream or reality?
Digital Sovereignty
European cyber sovereignty: dream or reality?
Read
06
MIN
Image [FIC 2022] A look back at the OSINT & Cyber Investigation Day
06.27.22
FIC 2022 A look back at the OSINT & Cyber Investigation Day
Read
07
MIN
Image How to monitor algorithms
Digital transformation
How to monitor algorithms
Read
08
MIN
Image How can we protect ourselves against network infrastructure sabotage?
Cybercrime
06.14.22 Cybercrime
How can we protect ourselves against network infrastructure sabotage?
Read
05
MIN
Image Securing the Metaverse: The Gulf’s Real-World Challenges for a Fictional Universe
Digital transformation
Securing the Metaverse: The Gulf’s Real-World Challenges for a Fictional Universe
Read
09
MIN
Image Cybercrime in West Africa: towards a multi-state organisation?
Cybercrime
06.01.22 Cybercrime
Cybercrime in West Africa: towards a multi-state organisation?
Read
06
MIN
Image Cybersecurity & Formula 1, a role model
Secops
05.23.22 Secops
Cybersecurity & Formula 1, a role model
Read
08
MIN
Image The shadow of social credit looms over Europe
Digital transformation
The shadow of social credit looms over Europe
Read
07
MIN
Image How digital KYC is transforming business
Digital identity
05.16.22 Digital identity
How digital KYC is transforming business
Read
05
MIN
Image NFTs, the new playground for cybercriminals
Cybercrime
05.02.22 Cybercrime
NFTs, the new playground for cybercriminals
Read
05
MIN
Image Cyberattacks and cognitive biases: what are our behaviours?
Risks management
04.22.22 Risks management
Cyberattacks and cognitive biases: what are our behaviours?
Read
06
MIN