Image Operational Technology Cybersecurity: A Strategic and Priority for EDF
Cybersecurity
05.07.25 Cybersecurity
Operational Technology Cybersecurity: A Strategic and Priority for EDF
Read
05
MIN
Image Industrial Cybersecurity: Securing the Value Chain and Building Trust
Industry and OT
05.05.25 Industry and OT
Industrial Cybersecurity: Securing the Value Chain and Building Trust
Read
05
MIN
Image Between tech and Trump: a Love-Hate relationship
Cyber stability
04.29.25 Cyber stability
Between tech and Trump: a Love-Hate relationship
Read
07
MIN
Image Military Operations and AI: What Role for Humans in the Decision-Making Loop?
Cyber stability
04.15.25 Cyber stability
Military Operations and AI: What Role for Humans in the Decision-Making Loop?
Read
05
MIN
Image Security requirements for connected products: the disruption brought by the Cyber Resilience Act
Cyber stability
04.14.25 Cyber stability
Security requirements for connected products: the disruption brought by the Cyber Resilience Act
Read
07
MIN
Image NIS2: The challenge of scaling up
Cybersecurity
04.11.25 Cybersecurity
NIS2: The challenge of scaling up
Read
04
MIN
Image Zero Trust: A pragmatic approach beyond the buzzword
Cybersecurity
04.10.25 Cybersecurity
Zero Trust: A pragmatic approach beyond the buzzword
Read
10
MIN
Image Labeling and Protecting Content: The Mission of Trust My Content
Digital Sovereignty
Labeling and Protecting Content: The Mission of Trust My Content
Read
03
MIN
Image How to restore trust in a troubled world
Cyber stability
04.04.25 Cyber stability
How to restore trust in a troubled world
Read
06
MIN
Image InCyber Defense: At the Heart of European Cyber Commands
Cyber stability
03.20.25 Cyber stability
InCyber Defense: At the Heart of European Cyber Commands
Read
12
MIN
Image DevSecOps and AI: how machine learning transforms the security approach
Cybersecurity
03.19.25 Cybersecurity
DevSecOps and AI: how machine learning transforms the security approach
Read
05
MIN
Image 2025, a decisive year for French cybersecurity
Cybersecurity
03.14.25 Cybersecurity
2025, a decisive year for French cybersecurity
Read
05
MIN
Image ZERO DAY or "computing, the worm in the fruit of our modern societies?"
Cyber +
03.05.25 Cyber +
ZERO DAY or “computing, the worm in the fruit of our modern societies?”
Read
09
MIN
Image Universal ZTNA: Why access management needs rethinking
Cybersecurity
03.03.25 Cybersecurity
Universal ZTNA: Why access management needs rethinking
Read
06
MIN
Image Cybersecurity: What if we learned by playing? Four experts testify
Cyber +
02.25.25 Cyber +
Cybersecurity: What if we learned by playing? Four experts testify
Read
10
MIN
Image Challenge or Opportunity: Should Chinese Tech Be Concerned About Donald Trump's Return?
Cyber stability
02.21.25 Cyber stability
Challenge or Opportunity: Should Chinese Tech Be Concerned About Donald Trump’s Return?
Read
07
MIN
Image Social Networks: The End of Fact-Checking Disrupts Moderation Policies
Digital Sovereignty
Social Networks: The End of Fact-Checking Disrupts Moderation Policies
Read
07
MIN
Image Local Authorities in Disarray Against Cyber Risks
Cybersecurity
02.12.25 Cybersecurity
Local Authorities in Disarray Against Cyber Risks
Read
07
MIN
Image 2025: A key year for OSINT and cybersecurity
Cybersecurity
02.07.25 Cybersecurity
2025: A key year for OSINT and cybersecurity
Read
02
MIN
Image DeepSeek: A Shockwave for Global Artificial Intelligence
Digital transformation
DeepSeek: A Shockwave for Global Artificial Intelligence
Read
04
MIN
Image The Difficult Task of Protecting Health Data
Cybersecurity
02.04.25 Cybersecurity
The Difficult Task of Protecting Health Data
Read
07
MIN