Image Zero Trust: A pragmatic approach beyond the buzzword
Cybersecurity
04.10.25 Cybersecurity
Zero Trust: A pragmatic approach beyond the buzzword
Read
10
MIN
Image Labeling and Protecting Content: The Mission of Trust My Content
Digital Sovereignty
Labeling and Protecting Content: The Mission of Trust My Content
Read
03
MIN
Image How to restore trust in a troubled world
Cyber stability
04.04.25 Cyber stability
How to restore trust in a troubled world
Read
06
MIN
Image InCyber Defense: At the Heart of European Cyber Commands
Cyber stability
03.20.25 Cyber stability
InCyber Defense: At the Heart of European Cyber Commands
Read
12
MIN
Image DevSecOps and AI: how machine learning transforms the security approach
Cybersecurity
03.19.25 Cybersecurity
DevSecOps and AI: how machine learning transforms the security approach
Read
05
MIN
Image 2025, a decisive year for French cybersecurity
Cybersecurity
03.14.25 Cybersecurity
2025, a decisive year for French cybersecurity
Read
05
MIN
Image ZERO DAY or "computing, the worm in the fruit of our modern societies?"
Cyber +
03.05.25 Cyber +
ZERO DAY or “computing, the worm in the fruit of our modern societies?”
Read
09
MIN
Image Universal ZTNA: Why access management needs rethinking
Cybersecurity
03.03.25 Cybersecurity
Universal ZTNA: Why access management needs rethinking
Read
06
MIN
Image Cybersecurity: What if we learned by playing? Four experts testify
Cyber +
02.25.25 Cyber +
Cybersecurity: What if we learned by playing? Four experts testify
Read
10
MIN
Image Challenge or Opportunity: Should Chinese Tech Be Concerned About Donald Trump's Return?
Cyber stability
02.21.25 Cyber stability
Challenge or Opportunity: Should Chinese Tech Be Concerned About Donald Trump’s Return?
Read
07
MIN
Image Social Networks: The End of Fact-Checking Disrupts Moderation Policies
Digital Sovereignty
Social Networks: The End of Fact-Checking Disrupts Moderation Policies
Read
07
MIN
Image Local Authorities in Disarray Against Cyber Risks
Cybersecurity
02.12.25 Cybersecurity
Local Authorities in Disarray Against Cyber Risks
Read
07
MIN
Image 2025: A key year for OSINT and cybersecurity
Cybersecurity
02.07.25 Cybersecurity
2025: A key year for OSINT and cybersecurity
Read
02
MIN
Image DeepSeek: A Shockwave for Global Artificial Intelligence
Digital transformation
DeepSeek: A Shockwave for Global Artificial Intelligence
Read
04
MIN
Image The Difficult Task of Protecting Health Data
Cybersecurity
02.04.25 Cybersecurity
The Difficult Task of Protecting Health Data
Read
07
MIN
Image Building a Trustworthy Environment: Zero Trust Model Deciphered
Cyber stability
01.30.25 Cyber stability
Building a Trustworthy Environment: Zero Trust Model Deciphered
Read
05
MIN
Image From misinformation to resilience: teaching open-source investigation for a better future
Cyber stability
01.29.25 Cyber stability
From misinformation to resilience: teaching open-source investigation for a better future
Read
07
MIN
Image European Cyber Cup: High-Caliber Partners
Cyber +
01.27.25 Cyber +
European Cyber Cup: High-Caliber Partners
Read
06
MIN
Image DORA: A Structural Revolution is underway
Digital Sovereignty
DORA: A Structural Revolution is underway
Read
06
MIN
Image Using role-playing and gaming to train cybersecurity experts
Cyber +
01.21.25 Cyber +
Using role-playing and gaming to train cybersecurity experts
Read
03
MIN
Image How moderators can legally manage harmful content and online hate
Cyber +
01.16.25 Cyber +
How moderators can legally manage harmful content and online hate
Read
07
MIN