Image Towards a [universal digital identity]: a technological and human challenge
Digital identity
11.20.24 Digital identity
Towards a universal digital identity: a technological and human challenge
Read
04
MIN
Image Linking health insurance card and Id Card: a good idea to combat social fraud?
Digital Sovereignty
Linking health insurance card and Id Card: a good idea to combat social fraud?
Read
04
MIN
Image Applications and challenges for the future european constellation Iris2
Digital Sovereignty
Applications and challenges for the future european constellation Iris2
Read
04
MIN
Image The Long March Toward Sovereign Cloud
Digital Sovereignty
The Long March Toward Sovereign Cloud
Read
07
MIN
Image Strengthening France's Strategic Position in the [Undersea Cable] Sector
Cybersecurity
11.12.24 Cybersecurity
Strengthening France’s Strategic Position in the Undersea Cable Sector
Read
09
MIN
Image Paris 2024 Olympics: Gold medal for the "Cyber Team"
Cyber stability
10.21.24 Cyber stability
Paris 2024 Olympics: Gold medal for the “Cyber Team”
Read
07
MIN
Image "In the shoes of a CISO faced with a cyber attack
Cybercrime
10.16.24 Cybercrime
“In the shoes of a CISO faced with a cyber attack
Read
05
MIN
Image Hidden costs: ignoring software patches can cripple your business
Cyber stability
10.14.24 Cyber stability
Hidden costs: ignoring software patches can cripple your business
Read
07
MIN
Image Shut Up and Dance (Black Mirror S3E3) or “a critical view of information?”
Cyber +
10.11.24 Cyber +
Shut Up and Dance (Black Mirror S3E3) or “a critical view of information?”
Read
06
MIN
Image The Post-Quantum Era: What Legal Perspectives Are Emerging?
Digital transformation
The Post-Quantum Era: What Legal Perspectives Are Emerging?
Read
04
MIN
Image Cyberattacks on big companies: what managers need to know
Cybersecurity
10.01.24 Cybersecurity
Cyberattacks on big companies: what managers need to know
Read
06
MIN
Image A win-win approach to cybersecurity
Cybersecurity
09.27.24 Cybersecurity
A win-win approach to cybersecurity
Read
06
MIN
Image Social Engineering on the attack: what [Cybermoi/s] 2024 Has in Store for You (2/2)
Cyber +
09.26.24 Cyber +
Social Engineering on the attack: what Cybermoi/s 2024 Has in Store for You (2/2)
Read
06
MIN
Image Social engineering on the attack: What [Cybermoi/s 2024] has in store for You (1/2)
Cyber +
09.25.24 Cyber +
Social engineering on the attack: What Cybermoi/s 2024 has in store for You (1/2)
Read
03
MIN
Image “Detroit: Become Human” or the anthropomorphic lure of machines
Cyber +
09.13.24 Cyber +
“Detroit: Become Human” or the anthropomorphic lure of machines
Read
09
MIN
Image OT/IoT: Pressure mounts on manufacturers
Industry and OT
09.11.24 Industry and OT
OT/IoT: Pressure mounts on manufacturers
Read
05
MIN
Image Web3, mobile dApps and cybersecurity: an overview 
Digital transformation
Web3, mobile dApps and cybersecurity: an overview 
Read
06
MIN
Image Is the indictment of Telegram’s CEO an attack on freedom of expression?
Digital Sovereignty
Is the indictment of Telegram’s CEO an attack on freedom of expression?
Read
06
MIN
Image [Vangelis Stykas] sounds the alarm on critical vulnerabilities threatening electric vehicles and photovoltaic systems
Industry and OT
08.07.24 Industry and OT
Vangelis Stykas sounds the alarm on critical vulnerabilities threatening electric vehicles and photovoltaic systems
Read
05
MIN
Image Shadow AI: Companies Structuring Their Approach
Risks management
07.24.24 Risks management
Shadow AI: Companies Structuring Their Approach
Read
06
MIN
Image Claire Lemarchand: "After a cyberattack, the biggest mistake is restarting too quickly"
Cybersecurity
07.19.24 Cybersecurity
Claire Lemarchand: “After a cyberattack, the biggest mistake is restarting too quickly”
Read
04
MIN