Image What regulation for the metaverse?
Digital transformation
What regulation for the metaverse?
Read
06
MIN
Image Russia-Ukraine conflict: ransomware groups in a difficult position
Cybercrime
03.02.22 Cybercrime
Russia-Ukraine conflict: ransomware groups in a difficult position
Read
03
MIN
Image Cybersecurity in India: the market almost doubled during the pandemic
Cybercrime
02.24.22 Cybercrime
Cybersecurity in India: the market almost doubled during the pandemic
Read
04
MIN
Image [PhilosoFIC research workshop] Is virtuality the reality of tomorrow?
Digital transformation
PhilosoFIC research workshop Is virtuality the reality of tomorrow?
Read
02
MIN
Image The cloud as a prerequisite for digital sovereignty
Digital transformation
The cloud as a prerequisite for digital sovereignty
Read
05
MIN
Image French cybersecurity training: state of play
Digital transformation
French cybersecurity training: state of play
Read
05
MIN
Image Killware puts people's lives at risk
Cybercrime
02.10.22 Cybercrime
Killware puts people’s lives at risk
Read
05
MIN
Image Cybersecurity: top management finally getting their act together
Risks management
02.08.22 Risks management
Cybersecurity: top management finally getting their act together
Read
06
MIN
Image Is North Korea a cybercriminal country?
Cyber stability
02.07.22 Cyber stability
Is North Korea a cybercriminal country?
Read
05
MIN
Image Digital Europe: real actions beyond good words
Digital transformation
Digital Europe: real actions beyond good words
Read
06
MIN
Image [Europe Calling] Actually, Europe is important
Digital transformation
Europe Calling Actually, Europe is important
Read
05
MIN
Image GISEC (21-23 March / Dubai)
Cybersecurity
01.17.22 Cybersecurity
GISEC (21-23 March / Dubai)
Read
01
MIN
Image Splinternet: the inexorable dislocation of the Internet?
Cyber stability
01.06.22 Cyber stability
Splinternet: the inexorable dislocation of the Internet?
Read
06
MIN
Image Towards an international regulation of algorithms?
Digital Sovereignty
Towards an international regulation of algorithms?
Read
06
MIN
Image Act No. 2021-1485 to reduce the environmental footprint of the digital sector in France
Digital Sovereignty
Act No. 2021-1485 to reduce the environmental footprint of the digital sector in France
Read
06
MIN
Image [Budapest Convention] A second protocol to fight cybercrime
Digital Sovereignty
Budapest Convention A second protocol to fight cybercrime
Read
10
MIN
Image Civil war in Saudi cyberspace?
Cyber stability
12.10.21 Cyber stability
Civil war in Saudi cyberspace?
Read
05
MIN
Image "Hack CYSAT" challenge: call for ideas opens
Cybersecurity
12.09.21 Cybersecurity
“Hack CYSAT” challenge: call for ideas opens
Read
01
MIN
Image Behind hacking competitions, the soft power of States
Cyber stability
12.01.21 Cyber stability
Behind hacking competitions, the soft power of States
Read
05
MIN
Image Data erasure: a resilient process
Secops
11.18.21 Secops
Data erasure: a resilient process
Read
03
MIN
Image Hardware and software obsolescence: a real resilience issue
Risks management
11.17.21 Risks management
Hardware and software obsolescence: a real resilience issue
Read
01
MIN