Image The cloud as a prerequisite for digital sovereignty
Digital transformation
The cloud as a prerequisite for digital sovereignty
Read
05
MIN
Image French cybersecurity training: state of play
Digital transformation
French cybersecurity training: state of play
Read
05
MIN
Image Killware puts people's lives at risk
Cybercrime
02.10.22 Cybercrime
Killware puts people’s lives at risk
Read
05
MIN
Image Cybersecurity: top management finally getting their act together
Risks management
02.08.22 Risks management
Cybersecurity: top management finally getting their act together
Read
06
MIN
Image Is North Korea a cybercriminal country?
Cyber stability
02.07.22 Cyber stability
Is North Korea a cybercriminal country?
Read
05
MIN
Image Digital Europe: real actions beyond good words
Digital transformation
Digital Europe: real actions beyond good words
Read
06
MIN
Image [Europe Calling] Actually, Europe is important
Digital transformation
Europe Calling Actually, Europe is important
Read
05
MIN
Image GISEC (21-23 March / Dubai)
Cybersecurity
01.17.22 Cybersecurity
GISEC (21-23 March / Dubai)
Read
01
MIN
Image Splinternet: the inexorable dislocation of the Internet?
Cyber stability
01.06.22 Cyber stability
Splinternet: the inexorable dislocation of the Internet?
Read
06
MIN
Image Towards an international regulation of algorithms?
Digital Sovereignty
Towards an international regulation of algorithms?
Read
06
MIN
Image Act No. 2021-1485 to reduce the environmental footprint of the digital sector in France
Digital Sovereignty
Act No. 2021-1485 to reduce the environmental footprint of the digital sector in France
Read
06
MIN
Image [Budapest Convention] A second protocol to fight cybercrime
Digital Sovereignty
Budapest Convention A second protocol to fight cybercrime
Read
10
MIN
Image Civil war in Saudi cyberspace?
Cyber stability
12.10.21 Cyber stability
Civil war in Saudi cyberspace?
Read
05
MIN
Image "Hack CYSAT" challenge: call for ideas opens
Cybersecurity
12.09.21 Cybersecurity
“Hack CYSAT” challenge: call for ideas opens
Read
01
MIN
Image Behind hacking competitions, the soft power of States
Cyber stability
12.01.21 Cyber stability
Behind hacking competitions, the soft power of States
Read
05
MIN
Image Data erasure: a resilient process
Secops
11.18.21 Secops
Data erasure: a resilient process
Read
03
MIN
Image Hardware and software obsolescence: a real resilience issue
Risks management
11.17.21 Risks management
Hardware and software obsolescence: a real resilience issue
Read
01
MIN
Image How to mitigate crypto risks with the right data-driven compliance strategy?
Cybercrime
11.16.21 Cybercrime
How to mitigate crypto risks with the right data-driven compliance strategy?
Read
01
MIN
Image Shaping Europe's Digital Future
Digital transformation
Shaping Europe’s Digital Future
Read
02
MIN
Image China, the all-out offensive
Digital transformation
China, the all-out offensive
Read
05
MIN
Image Towards a Europe of Cybersecurity
Digital transformation
Towards a Europe of Cybersecurity
Read
03
MIN