Image Tips for Effective Leadership During a Cyberattack
Risks management
09.20.22 Risks management
Tips for Effective Leadership During a Cyberattack
Read
08
MIN
Image 2022 FIFA World Cup: Qatar’s Cybersecurity Measures
Secops
09.20.22 Secops
2022 FIFA World Cup: Qatar’s Cybersecurity Measures
Read
12
MIN
Image How do we facilitate the building of datacenters in France?
Digital transformation
How do we facilitate the building of datacenters in France?
Read
09
MIN
Image [Questions about the metaverse. Episode 2]. How can we regulate toxic behaviour?
Digital transformation
Questions about the metaverse. Episode 2. How can we regulate toxic behaviour?
Read
07
MIN
Image [Questions about the metaverse. Episode 1]  Sexual assault: time for action
Digital transformation
Questions about the metaverse. Episode 1 Sexual assault: time for action
Read
05
MIN
Image [Europe calling] Is Resilience Within Reach?
Digital Sovereignty
Europe calling Is Resilience Within Reach?
Read
05
MIN
Image From WarGames to Mr. Robot: when hackers take over the big and small screens
Cybercrime
09.02.22 Cybercrime
From WarGames to Mr. Robot: when hackers take over the big and small screens
Read
07
MIN
Image Ukraine: a Cyber War Story
Cyber stability
09.02.22 Cyber stability
Ukraine: a Cyber War Story
Read
05
MIN
Image The French are aware of cyber risks but… are they truly responsible?
Risks management
08.03.22 Risks management
The French are aware of cyber risks but… are they truly responsible?
Read
06
MIN
Image Local authorities in the face of cybercrime
Risks management
08.03.22 Risks management
Local authorities in the face of cybercrime
Read
06
MIN
Image The long march towards corporate digital responsibility
Digital transformation
The long march towards corporate digital responsibility
Read
08
MIN
Image Health, a sector under high (cyber) tension
Risks management
08.03.22 Risks management
Health, a sector under high (cyber) tension
Read
08
MIN
Image How can industrial companies ensure the cybersecurity of their supply chain?
Industry and OT
07.25.22 Industry and OT
How can industrial companies ensure the cybersecurity of their supply chain?
Read
07
MIN
Image Biometric authentication: a model to follow?
Digital identity
07.25.22 Digital identity
Biometric authentication: a model to follow?
Read
06
MIN
Image Cyberattacks: a month after declaring a state of emergency, what is the situation in Costa Rica?
Cyber stability
07.11.22 Cyber stability
Cyberattacks: a month after declaring a state of emergency, what is the situation in Costa Rica?
Read
06
MIN
Image The Rise of Mobile Malware
Cybercrime
07.04.22 Cybercrime
The Rise of Mobile Malware
Read
06
MIN
Image European cyber sovereignty: dream or reality?
Digital Sovereignty
European cyber sovereignty: dream or reality?
Read
06
MIN
Image [FIC 2022] A look back at the OSINT & Cyber Investigation Day
06.27.22
FIC 2022 A look back at the OSINT & Cyber Investigation Day
Read
07
MIN
Image How to monitor algorithms
Digital transformation
How to monitor algorithms
Read
08
MIN
Image How can we protect ourselves against network infrastructure sabotage?
Cybercrime
06.14.22 Cybercrime
How can we protect ourselves against network infrastructure sabotage?
Read
05
MIN
Image Securing the Metaverse: The Gulf’s Real-World Challenges for a Fictional Universe
Digital transformation
Securing the Metaverse: The Gulf’s Real-World Challenges for a Fictional Universe
Read
09
MIN