Cybersecurity… The fifth dimension
Security and Stability in Cyberspace | Opinions

Cybersecurity… The fifth dimension

Cybersecurity, an obscure realm to the uninitiated masses, is nonetheless taking on crucial significance  and becoming a tangible reality, gaining notoriety in recent years and establishing itself as nothing less than a new area alongside the traditional physical areas of land, sea, air and space. This fifth dimension is that of “immaterial ...

Agenda

+

Videos

  • Cyber industrial safety
  • Security and Stability in Cyberspace
  • Cybercrime
  • Cyber risks
  • Operational security
  • Antifraud action
  • Digital identity & KYC
  • Digital Sovereignty
  • Digital transition
Cyber industrial safety
21 U.S. LNG producers hacked
4 April 2022

21 U.S. LNG producers hacked

U.S. cybersecurity firm Resecurity recently revealed a massive hacking operation targeting 21 U.S. liquefied natural gas (LNG) producers.
The French food giant Avril victim of a cyberattack
24 November 2021

The French food giant Avril victim of a cyberattack

On 3 November 2021, the Avril group, victim of a cyberattack, decided to cut its IT network, causing a slowdown of its activity
Thales strengthens its cooperation with Microsoft Azure
25 October 2021

Thales strengthens its cooperation with Microsoft Azure

Thales strengthens its cooperation with Microsoft Azure and joins MISA
Airbus CyberSecurity and Alstom signed a partnership
25 October 2021

Airbus CyberSecurity and Alstom signed a partnership

Airbus CyberSecurity and Alstom signed a partnership to strengthen rail transport cybersecurity
Nozomi Networks’ survey
25 October 2021

Nozomi Networks’ survey

OT/ICS cybersecurity threats are on the rise, according to a survey by Nozomi Networks
SCADAfence & Keysight Technologies
22 October 2021

SCADAfence & Keysight Technologies

SCADAfence partners with Keysight Technologies to improve the security of industrial OT networks
Security and Stability in Cyberspace
Cybersecurity… The fifth dimension
17 May 2022

Cybersecurity… The fifth dimension

Cybersecurity, an obscure realm to the uninitiated masses, is nonetheless taking on crucial significance  and becoming a tangible reality, gaining notoriety in recent years and establishing itself ...
China: cyber espionage against Russia
5 May 2022

China: cyber espionage against Russia

On 27 April 2022, Secureworks uncovered a cyber espionage campaign specifically targeting Russia and attributed to China.
Citizen Lab reveals new Pegasus infections
25 April 2022

Citizen Lab reveals new Pegasus infections

The Canadian NGO Citizen Lab has just detailed two new European offensives by Israeli spyware programs Pegasus and Candiru: one targeted the British government, the other the Catalan independence ...
European Commission targeted by Pegasus
25 April 2022

European Commission targeted by Pegasus

Four members of the European Commission—including Didier Reynders, European Commissioner for Justice—were allegedly targeted by Pegasus, NSO’s spyware.
[REPORT] Videogames, a new weapon of influence
20 April 2022

[REPORT] Videogames, a new weapon of influence

On February 24th, Russian Armed Forces launched a multipronged invasion of Ukraine, targeting Kharkiv in particular, the country’s second largest city. Located forty or so kilometers from the ...
South Korea raises its cybersecurity alert level
4 April 2022

South Korea raises its cybersecurity alert level

The Ministry of Defence and the National Intelligence Service of South Korea have just raised their cybersecurity alert level.
Cybercrime
Infiltrating the malware sales market
9 May 2022

Infiltrating the malware sales market

The Institute for Combating Economic Crime of the Arc School of Management in Neuchatel, in collaboration with the School of Criminology of the University of Montreal, has conducted a study on the ...
NFTs, the new playground for cybercriminals
2 May 2022

NFTs, the new playground for cybercriminals

Today, non-fungible tokens are attracting everyone, and hackers do not want to be beholden. Account usurpation, phishing campaigns, or counterfeit NFTs: the number of cases of hacking has increased ...
Crowd security: successfully fighting cyber attacks together
26 April 2022

Crowd security: successfully fighting cyber attacks together

Collaborative security for computers, servers, containers, and even cloud services on the Internet should enable a modern version of the fight against intruders. Is crowd security just a myth, or can ...
Ukraine has prevented a Sandworm attack on its power grid
25 April 2022

Ukraine has prevented a Sandworm attack on its power grid

The Ukrainian government’s CERT managed to block an attack on its power grid attributed to Sandworm, a group linked to Russian intelligence.
Microsoft takes control of ZLoader botnet infrastructure
25 April 2022

Microsoft takes control of ZLoader botnet infrastructure

Microsoft has announced that it has carried out a major offensive against the ZLoader botnet and take control of the domains it was using.
International military organisations targeted by cybercriminals
11 April 2022

International military organisations targeted by cybercriminals

Google’s Threat Analysis Group warns of recent activities of cybercriminal groups against military organisations, including a NATO centre.
Cyber risks
Fighting deepfakes: a “top priority” for Europol
5 May 2022

Fighting deepfakes: a “top priority” for Europol

A report by the Europol Innovation Lab says that “deepfake prevention and detection” must be “top law enforcement priority.“
Cyberattacks and cognitive biases: what are our behaviours?
25 April 2022

Cyberattacks and cognitive biases: what are our behaviours?

A cyberattack often requires the attacker to deploy strategies that are intended to trigger expected reactions from the target. Some of these reactions are governed by cognitive biases.
Cybersecurity maturity of large organisations: “Could do better”
25 April 2022

Cybersecurity maturity of large organisations: “Could do better”

There is still room for improvement in this area, as shown by the benchmark carried out by the consultancy firm Wavestone among more than 75 of its clients. It gives them an overall maturity score ...
What cybersecurity for the space sector? Ideas from the CYSAT conference
22 April 2022

What cybersecurity for the space sector? Ideas from the CYSAT conference

Threats to space are increasing. Such is the observation made by many specialists and players in cybersecurity and space at the CYSAT conference held in Paris on 6 and 7 April. At Station F, they ...
ETIs in the face of cyber risk: playing the cyber proximity game
20 April 2022

ETIs in the face of cyber risk: playing the cyber proximity game

Often with little or no protection against cyber risks, intermediate-sized enterprises (aka ETIs) have become prime targets for cybercriminals. Their digital hygiene and their ‘protective ...
What place should cybersecurity have in annual reports?
11 April 2022

What place should cybersecurity have in annual reports?

Organisations—whether private or public—are responsible for their computer networks and the data they use. However, the annual reports they publish to present their results and review their ...
Operational security
Critical asset protection in the Active Directory: What do you need to know?
25 April 2022

Critical asset protection in the Active Directory: What do you need to know?

How can you protect your critical assets in Active Directory thanks to the privileged access workstations (or PAWs)? To understand the ins and outs, follow the advice of Sylvain Cortes, Security ...
600,000 U.S. cybersecurity jobs sit empty
11 April 2022

600,000 U.S. cybersecurity jobs sit empty

A recent analysis by CyberSeek confirms the shortage of cybersecurity talent in the U.S., with 600,000 unfilled positions for 1 million current employees.
$77.5 billion in cybersecurity M&As in 2021
28 February 2022

$77.5 billion in cybersecurity M&As in 2021

Momentum Cyber’s latest annual report on cybersecurity financing reveals a record $77.5 billion in total M&A activity in 2021.
Cybersecurity in India: the market almost doubled during the pandemic
28 February 2022

Cybersecurity in India: the market almost doubled during the pandemic

The pandemic has seen ransomware attacks explode in India, hitting the country’s businesses hard. Fortunately, the Indian ecosystem is getting organised and startups are gaining momentum, ...
Cloud: Google acquires cybersecurity startup Siemplify
26 January 2022

Cloud: Google acquires cybersecurity startup Siemplify

Google confirmed in early January 2022 that it had acquired Israeli cybersecurity startup Siemplify and integrated it into Google Cloud Security.
Security breaches: Joe Biden’s ultimatum to federal agencies
24 November 2021

Security breaches: Joe Biden’s ultimatum to federal agencies

U.S. President Joe Biden and the Cybersecurity and Infrastructure Security Agency (CISA) give U.S. federal agencies six months to fix their security flaws
Antifraud action
USA: 5 years in prison for an Estonian hacker specialising in financial fraud
11 April 2022

USA: 5 years in prison for an Estonian hacker specialising in financial fraud

A U.S. court has sentenced Maksim Berezan, an Estonian cybercriminal involved in 13 ransomware attacks and numerous financial frauds, to five years in prison.
Cryptocurrency: $14 billion in fraud in 2021
21 February 2022

Cryptocurrency: $14 billion in fraud in 2021

Financial analysis firm Chainalysis has just unveiled its 2021 cryptocurrency fraud assessment, which reaches $14 billion.
Russian “fraud king” cybercriminal sentenced
24 November 2021

Russian “fraud king” cybercriminal sentenced

The U.S. justice system has sentenced Aleksandr Zhukov—a Russian cybercriminal and self-proclaimed “king of online ad fraud—,” to 10 years in prison
U.S. seeks to strengthen global cooperation against cybercrime
25 October 2021

U.S. seeks to strengthen global cooperation against cybercrime

On 13-14 October 2021, U.S. President Joe Biden convened a virtual summit with officials from about 30 countries to accelerate cooperation in the fight against cybercrime, including on the issue of ...
Crypto-assets – New technologies can help combat AML/CFT
27 July 2021

Crypto-assets – New technologies can help combat AML/CFT

While Anti-Money Laundering/Combating the Financing of Terrorism international standards are in place, most jurisdictions have just begun to implement and enforce them. The supervision of ...
2020: A record year for data leaks
20 July 2021

2020: A record year for data leaks

Data leaks have taken off like never before in 2020. Such is the conclusion of the new Data Breach Barometer. This study has been unveiled during a thematic breakfast hosted by the International ...
Digital identity & KYC
How digital KYC is transforming business
16 May 2022

How digital KYC is transforming business

Formerly used to combat money laundering, “know your customer” (KYC) is expanding its scope and recurrence to become cyber-resilient. Previously a characteristic of the financial sector alone, ...
USA: towards a federal digital identity framework?
25 April 2022

USA: towards a federal digital identity framework?

In an open letter, identity security experts have urged U.S. President Joe Biden to deploy a federal digital identity framework by Executive Order.
Estonia supports UNHCR’s digital identity for refugees
16 December 2021

Estonia supports UNHCR’s digital identity for refugees

The UN High Commissioner for Refugees (UNHCR) detailed on 6 December 2021 how Estonia provided it with a digital identity specialist to accelerate its digital transformation.
UK to launch digital identity in April 2022
24 November 2021

UK to launch digital identity in April 2022

The UK government has said that the first version of its digital identity service—called One Login—is expected to go live in April 2022
Senator wants to control digital identity on social media
24 November 2021

Senator wants to control digital identity on social media

Senator proposes law to control digital identity of social media users
Monaco: a new digital identity document
25 October 2021

Monaco: a new digital identity document

Monaco: 70% of those who applied for a new identity document opted for the digital version
Digital Sovereignty
The digital dollar: an innovative project with many questions
2 May 2022

The digital dollar: an innovative project with many questions

Digital currency projects led by central banks have been on the rise for several months, driven in particular by the explosion of the crypto-asset market. In the United States, the prospect of a ...
Prospecting file and GDPR: 3 steps not to be missed!
2 February 2022

Prospecting file and GDPR: 3 steps not to be missed!

With the development of Big Data, the amount of data generated by browsing networks, subscribing to online contracts, or the use of software solutions is essential for all organizations.
Towards an international regulation of algorithms?
6 January 2022

Towards an international regulation of algorithms?

By disrupting organisations, artificial intelligence (AI) algorithms have revealed previously unknown vulnerabilities. For this reason, there is a growing demand for a legislative framework governing ...
The Dutch Online Trust Coalition on the EUCS
21 December 2021

The Dutch Online Trust Coalition on the EUCS

The OTC (Online Trust Coalition) in the Netherlands, a Private-Public partnership of 24 organizations in the Netherlands, have recently expressed their concerns in a recent letter to the EU ...
[Budapest Convention] A second protocol to fight cybercrime
16 December 2021

[Budapest Convention] A second protocol to fight cybercrime

Almost 20 years to the day after the Budapest Convention was opened for signature, a second additional protocol was adopted on 17 November by the Committee of Ministers of the Council of Europe. ...
Act No. 2021-1485 to reduce the environmental footprint of the digital sector in France
16 December 2021

Act No. 2021-1485 to reduce the environmental footprint of the digital sector in France

The law is an illustration of the convergence between the digital transformation and the ecological transition. It is inspired by the information report drawn up by two senators, dated 24 June ...
Digital transition
Google: new personal data policy
5 May 2022

Google: new personal data policy

Internet users can now have additional personal data removed from Google search results: telephone number, email address, postal address, etc.
Women4Cyber, a foundation for the inclusion of women in cybersecurity
27 April 2022

Women4Cyber, a foundation for the inclusion of women in cybersecurity

Cybersecurity has become a sector of paramount importance to strengthen our economic and digital sovereignty strategy. In recent years, many initiatives have been launched to boost the ecosystem and ...
Cybersecurity: Canada accelerates, with Quebec on the front line
20 April 2022

Cybersecurity: Canada accelerates, with Quebec on the front line

The launch of the Canadian In-Sec-M cluster—an $80 million investment by Quebec to support research, development, and marketing—and the creation of the first ministry of cybersecurity and ...
EU public consultation on connected vehicle data
11 April 2022

EU public consultation on connected vehicle data

The European Union has opened a public consultation—which will last until 21 June 2022—on access to data generated by connected vehicles.
What regulation for the metaverse?
4 April 2022

What regulation for the metaverse?

Appearing as a new space to be conquered, worthy of a virtual El Dorado, the metaverse makes us ponder how it should be regulated to avoid the domination of a might-makes-right situation.
What are the changes in how local authorities consider cybersecurity?
21 March 2022

What are the changes in how local authorities consider cybersecurity?

The health crisis has accelerated the implementation of digital services offered by local authorities to citizens. Their use is only possible in an environment of trust, which is guaranteed by ...

Comic of the month

Cyberwar in the clouds

Our
partners