Image [FIC 2022] A look back at the OSINT & Cyber Investigation Day
06.27.22
FIC 2022 A look back at the OSINT & Cyber Investigation Day
Read
07
MIN
Image How to monitor algorithms
Digital transformation
How to monitor algorithms
Read
08
MIN
Image How can we protect ourselves against network infrastructure sabotage?
Cybercrime
06.14.22 Cybercrime
How can we protect ourselves against network infrastructure sabotage?
Read
05
MIN
Image Securing the Metaverse: The Gulf’s Real-World Challenges for a Fictional Universe
Digital transformation
Securing the Metaverse: The Gulf’s Real-World Challenges for a Fictional Universe
Read
09
MIN
Image Cybercrime in West Africa: towards a multi-state organisation?
Cybercrime
06.01.22 Cybercrime
Cybercrime in West Africa: towards a multi-state organisation?
Read
06
MIN
Image Cybersecurity & Formula 1, a role model
Secops
05.23.22 Secops
Cybersecurity & Formula 1, a role model
Read
08
MIN
Image The shadow of social credit looms over Europe
Digital transformation
The shadow of social credit looms over Europe
Read
07
MIN
Image How digital KYC is transforming business
Digital identity
05.16.22 Digital identity
How digital KYC is transforming business
Read
05
MIN
Image NFTs, the new playground for cybercriminals
Cybercrime
05.02.22 Cybercrime
NFTs, the new playground for cybercriminals
Read
05
MIN
Image Cyberattacks and cognitive biases: what are our behaviours?
Risks management
04.22.22 Risks management
Cyberattacks and cognitive biases: what are our behaviours?
Read
06
MIN
Image [REPORT] Videogames, a new weapon of influence
Cyber stability
04.13.22 Cyber stability
REPORT Videogames, a new weapon of influence
Read
07
MIN
Image [Million euro baby] What's next for EU funding in cybersecurity?
04.13.22
Million euro baby What’s next for EU funding in cybersecurity?
Read
02
MIN
Image Cybersecurity maturity of large organisations: "Could do better"
Risks management
04.12.22 Risks management
Cybersecurity maturity of large organisations: “Could do better”
Read
04
MIN
Image What cybersecurity for the space sector? Ideas from the CYSAT conference
Risks management
04.12.22 Risks management
What cybersecurity for the space sector? Ideas from the CYSAT conference
Read
03
MIN
Image ETIs in the face of cyber risk: playing the cyber proximity game
Risks management
04.06.22 Risks management
ETIs in the face of cyber risk: playing the cyber proximity game
Read
05
MIN
Image Cybersecurity: Canada accelerates, with Quebec on the front line
Digital transformation
Cybersecurity: Canada accelerates, with Quebec on the front line
Read
07
MIN
Image Knowing the enemy and knowing yourself: the key to countering a cyberattack
Cybercrime
03.21.22 Cybercrime
Knowing the enemy and knowing yourself: the key to countering a cyberattack
Read
06
MIN
Image Launch of the FIC North America!
03.16.22
Launch of the FIC North America!
Read
01
MIN
Image What place should cybersecurity have in annual reports?
Risks management
03.15.22 Risks management
What place should cybersecurity have in annual reports?
Read
07
MIN
Image Cybersecurity is only one of the pillars of digital responsibility!
Risks management
03.08.22 Risks management
Cybersecurity is only one of the pillars of digital responsibility!
Read
05
MIN
Image [Europe Calling] What about cyber sanctions?
Digital Sovereignty
Europe Calling What about cyber sanctions?
Read
05
MIN