Image Splinternet: the inexorable dislocation of the Internet?
Cyber stability
01.06.22 Cyber stability
Splinternet: the inexorable dislocation of the Internet?
Read
06
MIN
Image Towards an international regulation of algorithms?
Digital Sovereignty
Towards an international regulation of algorithms?
Read
06
MIN
Image Act No. 2021-1485 to reduce the environmental footprint of the digital sector in France
Digital Sovereignty
Act No. 2021-1485 to reduce the environmental footprint of the digital sector in France
Read
06
MIN
Image [Budapest Convention] A second protocol to fight cybercrime
Digital Sovereignty
Budapest Convention A second protocol to fight cybercrime
Read
10
MIN
Image Civil war in Saudi cyberspace?
Cyber stability
12.10.21 Cyber stability
Civil war in Saudi cyberspace?
Read
05
MIN
Image "Hack CYSAT" challenge: call for ideas opens
Cybersecurity
12.09.21 Cybersecurity
“Hack CYSAT” challenge: call for ideas opens
Read
01
MIN
Image Behind hacking competitions, the soft power of States
Cyber stability
12.01.21 Cyber stability
Behind hacking competitions, the soft power of States
Read
05
MIN
Image Data erasure: a resilient process
Secops
11.18.21 Secops
Data erasure: a resilient process
Read
03
MIN
Image Hardware and software obsolescence: a real resilience issue
Risks management
11.17.21 Risks management
Hardware and software obsolescence: a real resilience issue
Read
01
MIN
Image How to mitigate crypto risks with the right data-driven compliance strategy?
Cybercrime
11.16.21 Cybercrime
How to mitigate crypto risks with the right data-driven compliance strategy?
Read
01
MIN
Image Shaping Europe's Digital Future
Digital transformation
Shaping Europe’s Digital Future
Read
02
MIN
Image China, the all-out offensive
Digital transformation
China, the all-out offensive
Read
05
MIN
Image Towards a Europe of Cybersecurity
Digital transformation
Towards a Europe of Cybersecurity
Read
03
MIN
Image Finding your way through cybersecurity assessments
Secops
10.14.21 Secops
Finding your way through cybersecurity assessments
Read
05
MIN
Image Vulnerabilities: the central issue of governance
Cybercrime
10.14.21 Cybercrime
Vulnerabilities: the central issue of governance
Read
05
MIN
Image Cyberwar in the clouds
Cybersecurity
10.06.21 Cybersecurity
Cyberwar in the clouds
Read
01
MIN
Image FIC2022: 1st Scientific Committee
Cybersecurity
10.05.21 Cybersecurity
FIC2022: 1st Scientific Committee
Read
01
MIN
Image Cyber Cold War?
Cybersecurity
08.31.21 Cybersecurity
Cyber Cold War?
Read
01
MIN
Image The "right to be forgotten" is not an absolute right
Digital Sovereignty
The “right to be forgotten” is not an absolute right
Read
08
MIN
Image Due Diligence : a Core Principle in the Fight against Ransomware and Cybercrime
Secops
08.23.21 Secops
Due Diligence : a Core Principle in the Fight against Ransomware and Cybercrime
Read
22
MIN
Image National Cloud Strategy: is France ready to enter the era of liquid computing?
Digital transformation
National Cloud Strategy: is France ready to enter the era of liquid computing?
Read
10
MIN