Image Cybersecurity and Blockchain: What are the prospects?
Digital transformation
Cybersecurity and Blockchain: What are the prospects?
Read
04
MIN
Image [Minority Report :] The Temptation of Predicting Behavior
Cyber +
07.04.24 Cyber +
Minority Report : The Temptation of Predicting Behavior
Read
05
MIN
Image ["Nosedive (Black Mirror)"]: Are We Heading Towards a Digital Colonization of Reality?
Cyber +
06.10.24 Cyber +
“Nosedive (Black Mirror)”: Are We Heading Towards a Digital Colonization of Reality?
Read
07
MIN
Image From London to Paris: the changing threat landscape of high-profile international events
Digital transformation
From London to Paris: the changing threat landscape of high-profile international events
Read
05
MIN
Image [Cyberthreats : ]European elections under strict surveillance
Cyber stability
05.29.24 Cyber stability
Cyberthreats : European elections under strict surveillance
Read
03
MIN
Image Trusted Data at the Core of OneTrust's Platform
Cybersecurity
05.27.24 Cybersecurity
Trusted Data at the Core of OneTrust’s Platform
Read
04
MIN
Image [2024 InCyber Forum] Digital threats and the amplification of AI: is Europe still in the running?
Risks management
05.21.24 Risks management
2024 InCyber Forum Digital threats and the amplification of AI: is Europe still in the running?
Read
04
MIN
Image [Neuromancer :] a deep dive into the source of [cyberpunk culture]
Cyber +
05.14.24 Cyber +
Neuromancer : a deep dive into the source of cyberpunk culture
Read
06
MIN
Image Industry 4.0 and IIoT Security: Strategies for a Resilient Future
Industry and OT
05.09.24 Industry and OT
Industry 4.0 and IIoT Security: Strategies for a Resilient Future
Read
05
MIN
Image CNIL and AI: Understand, Support and Control
Cyber stability
04.23.24 Cyber stability
CNIL and AI: Understand, Support and Control
Read
07
MIN
Image Thierry Breton and the construction of the European digital landscape
Digital Sovereignty
Thierry Breton and the construction of the European digital landscape
Read
05
MIN
Image Russia's offensive on "digital sovereignty" in Africa
Cyber stability
04.12.24 Cyber stability
Russia’s offensive on “digital sovereignty” in Africa
Read
06
MIN
Image Child privacy and protection: finding the right balance in the fight against dangerous sexual content
Risks management
04.09.24 Risks management
Child privacy and protection: finding the right balance in the fight against dangerous sexual content
Read
04
MIN
Image PhilosoFIC:are generative algorithms accelerators or the gravediggers of human intelligence?
Digital transformation
PhilosoFIC:are generative algorithms accelerators or the gravediggers of human intelligence?
Read
06
MIN
Image Jean-Jacques Latour: "To date, we have not identified any new threat linked to artificial intelligence"
Risks management
03.18.24 Risks management
Jean-Jacques Latour: “To date, we have not identified any new threat linked to artificial intelligence”
Read
06
MIN
Image Grand Est : a dynamic, structured ecosystem
Cybersecurity
03.15.24 Cybersecurity
Grand Est : a dynamic, structured ecosystem
Read
05
MIN
Image Storage must form the core of an enterprise cybersecurity strategy
Risks management
03.14.24 Risks management
Storage must form the core of an enterprise cybersecurity strategy
Read
05
MIN
Image Cybersecurity specialist: a profession under mounting pressure
Digital transformation
Cybersecurity specialist: a profession under mounting pressure
Read
07
MIN
Image Cloud Sprawl Is Making Businesses Vulnerable to Cyberattacks
Secops
03.11.24 Secops
Cloud Sprawl Is Making Businesses Vulnerable to Cyberattacks
Read
05
MIN
Image Government administration: France and Germany join forces to develop sovereign tools
Digital Sovereignty
Government administration: France and Germany join forces to develop sovereign tools
Read
02
MIN
Image Israel-Hamas cyberwar : Google emphasizes key role of Iran
Cyber stability
03.05.24 Cyber stability
Israel-Hamas cyberwar : Google emphasizes key role of Iran
Read
02
MIN