Cybersecurity Maturity in the UAE: A fast and continuous improvement process
Digital transition

Cybersecurity Maturity in the UAE: A fast and continuous improvement process

By Antoun Beyrouthy
The Emirate has been rapidly maturing in the cyber sector, both in the public and private sectors. It took the country only one year (from 2019 to 2020) to move from 33rd to 5th place, according to the Global Cyber Security Index.

Agenda

+

Vidéos

  • Cyber industrial safety
  • Security and Stability in Cyberspace
  • Cybercrime
  • Cyber risks
  • Operational security
  • Antifraud action
  • Digital identity & KYC
  • Digital Sovereignty
  • Digital transition
Cyber industrial safety
Everchanging cyberthreats in the energy sector
20 January 2023

Everchanging cyberthreats in the energy sector

By Fabrice Deblock
APT-type attacks, widely covered hacktivist acts, cybercriminal ransomware… Businesses in the energy sector must grasp the extent of the challenges they face.
Offshore oil and gas: US warns of cyber risk
22 December 2022

Offshore oil and gas: US warns of cyber risk

A report by the Government Accountability Office denounces the obsolescence of software used on many offshore platforms.
How Europe wants to protect its IT infrastructure in the future
08 December 2022

How Europe wants to protect its IT infrastructure in the future

By Thomas Joos
The importance of IT infrastructure is steadily increasing for companies, organizations and entire nations. From the EU’s perspective, a cyber attack on one country can even affect the entire ...
What are the different cyber threats against solar panels?
03 November 2022

What are the different cyber threats against solar panels?

DNV provides an update on cyber threats to energy infrastructure, particularly photovoltaic panels
Israel: pro-Palestine hacktivists hack SCADA/ICS controllers
23 September 2022

Israel: pro-Palestine hacktivists hack SCADA/ICS controllers

The GhostSec hacktivist group has claimed it gained control of 55 PLCs at Israeli industrial organisations as part of the “Free Palestine” campaign.
How can industrial companies ensure the cybersecurity of their supply chain?
25 July 2022

How can industrial companies ensure the cybersecurity of their supply chain?

By Thomas Joos
Production in industrial companies depends heavily on successful supply chains, as raw materials, materials required for production and usually numerous additional things are necessary to achieve a ...
Security and Stability in Cyberspace
Ukraine: mobile apps, a new weapon
30 January 2023

Ukraine: mobile apps, a new weapon

By Pierre-Yves Baillet
Ukrainian forces have managed to stop, and reverse, Russia’s progress, thanks to Western support. Ukrainian ingenuity has also been a decisive factor in several areas, particularly in militarizing ...
From Ukraine to Pakistan, a journey to the heart of Internet geopolitics
16 January 2023

From Ukraine to Pakistan, a journey to the heart of Internet geopolitics

By Richard Dalleau
The Internet is a constrained space, with its own bottlenecks, center and periphery, its land and sea powers. This is one of the conclusions of the colloquium on the geopolitics of Internet routes ...
US nuclear research labs targeted by Russian cybercriminals
13 January 2023

US nuclear research labs targeted by Russian cybercriminals

The Cold River group reportedly launched phishing attacks against three research centres in summer 2022, including one specialising in nuclear weaponry
North Korea: a specialist in cryptocurrency theft
09 January 2023

North Korea: a specialist in cryptocurrency theft

A South Korean intelligence report accuses Pyongyang of stealing $1.2 billion in cryptocurrency since 2017
The criminal police is entering the Metaverse
30 December 2022

The criminal police is entering the Metaverse

By Pascal Coillet-Matillon
In October 2022, the European Criminal Police Agency (Europol) and the International Criminal Police Organization (Interpol) each released their own reports on the Metaverse. Why? They want to enter ...
Cybersecurity: why Japan is eyeing Europe
28 December 2022

Cybersecurity: why Japan is eyeing Europe

By Mériadec Raffray
Worried about its cybersecurity and being respectful of private data, Japan is urgently seeking the right formula to defend itself. It is looking to Europe, on the verge of creating a “common ...
Cybercrime
Free decryption key for MegaCortex
13 January 2023

Free decryption key for MegaCortex

Bitdefender, working with Europol, the Swiss authorities and the No More Ransom project, has made this cyber defence tool available online
New wiper strikes Russian institutions
22 December 2022

New wiper strikes Russian institutions

Known as “CryWiper”, it’s disguised as ransomware. Its origin is unknown, but its power to cause harm is tremendous.
Chinese cyber attack on Amnesty International
22 December 2022

Chinese cyber attack on Amnesty International

Secureworks reveals that a spyware spied on the Canadian division of the NGO.
Canada: Sobeys pharmacies fall victim to a cyberattack
23 November 2022

Canada: Sobeys pharmacies fall victim to a cyberattack

In Canada, the Empire Group, owner of Sobeys pharmacies, suffered a cyber attack that paralyzed the processing of prescriptions.
LockBit affiliate arrested in Canada
23 November 2022

LockBit affiliate arrested in Canada

In late October 2022, Europol coordinated the arrest of a Lockbit affiliate in Canada. He is suspected of attacks against critical infrastructure.
Dutch police trick DeadBolt ransomware gang
03 November 2022

Dutch police trick DeadBolt ransomware gang

By faking ransom payments, the Dutch police and the cybersecurity firm Responders recovered 155 decryption keys from the cybercriminal group DeadBolt
Cyber risks
The protection of citizens and children on the Internet, a priority issue in 2023
17 January 2023

The protection of citizens and children on the Internet, a priority issue in 2023

By Hervé Le Jouan
2022 will have seen another explosion in the number of Internet scams. Hackers are becoming more and more professional. They also use all the communication means at their disposal by exploiting our ...
[OneTrust] The many aspects of GRC platforms (Governance, Risk and Compliance)
16 January 2023

[OneTrust] The many aspects of GRC platforms (Governance, Risk and Compliance)

By Fabrice Deblock
Covering a wide variety of risks, what are known as “GRC” solutions allow businesses to deal with conventional and emerging risks that affect them, all the while correcting vulnerabilities and ...
Cybercriminals are also using ChatGPT
13 January 2023

Cybercriminals are also using ChatGPT

OpenAI’s chat tool is adept at crafting phishing and malware messages
Israeli spyware targets security cameras
09 January 2023

Israeli spyware targets security cameras

Sold only to state organisations, it can be used to take control of these cameras and even modify recordings
Five cyber threats to watch out for in 2023
09 January 2023

Five cyber threats to watch out for in 2023

By Fabrice Deblock
Triple extortion, attacks on multi-factor authentication (MFA) solutions, the extension of phishing to other types of messaging, browser-based attacks, and the widespread use of AI are the cyber ...
Layer defences for the best ransomware protection
06 January 2023

Layer defences for the best ransomware protection

By Zachary Amos
The best cybersecurity defence strategy is one where there are as many barriers as possible. Even if the hacker breaks through one wall, they will encounter more. Layered defences are the optimal ...
Operational security
$4.8 million to train cybersecurity experts at the University of Oregon
13 January 2023

$4.8 million to train cybersecurity experts at the University of Oregon

This National Science Foundation grant is designed to help the US fill its cybersecurity workforce shortage
Sustainable data destruction: the public sector can do better
09 November 2022

Sustainable data destruction: the public sector can do better

By Marc Auxenfants
Every year, government organizations around the world spend hundreds of millions of dollars on the physical destruction and repurchase of perfectly good IT equipment. Secure data destruction ...
[EBOOK] Blancco: 3 Guidelines for Communicating (and Implementing) Eco-Friendly IT Asset Disposal Policies
07 November 2022

[EBOOK] Blancco: 3 Guidelines for Communicating (and Implementing) Eco-Friendly IT Asset Disposal Policies

Discover Blancco’s new ebook for Communicating (and Implementing) Eco-Friendly IT Asset Disposal Policies through 3 Guidelines: (1) Embrace Change (Management), (2) Commit to Device ...
[Interview] Gérald Kugler, HP: “Endpoint devices contribute to enterprise resilience”
12 October 2022

[Interview] Gérald Kugler, HP: “Endpoint devices contribute to enterprise resilience”

By Fabrice Deblock
In order to provide its equipment with security systems that are independent of any third-party editor, the manufacturer HP has built an ambitious strategy. Gérald Kugler, its Chief Technologist ...
The CISO as a catalyst for cyber awareness among boards of directors
11 October 2022

The CISO as a catalyst for cyber awareness among boards of directors

By Fabrice Deblock
The attacks that have hit many companies in recent years have made executives and their comex aware of the risks involved and the need to take action. The CISO has played a central role in raising ...
Tips for Effective Leadership During a Cyberattack
20 September 2022

Tips for Effective Leadership During a Cyberattack

By Zachary Amos
Cyberattacks are almost unavoidable now that everyone relies on the internet daily. While they may not be entirely preventable, you can be prepared in case a cyberattack happens to your ...
Antifraud action
Digital fraud on the rise worldwide
09 January 2023

Digital fraud on the rise worldwide

A LexisNexis report shows that bot attacks have increased by 38% (155% in e-commerce) and human attacks by 32%
USA: Equifax compensates victims of 2017 data breach
09 January 2023

USA: Equifax compensates victims of 2017 data breach

Cybercriminals are taking advantage of this large-scale attack to develop new scams
Stealers in Google sponsored links
06 January 2023

Stealers in Google sponsored links

Cybercriminals thwart Google’s vigilance by creating a harmless site, which then redirects to a second site containing malicious software
Beware of CryptosLabs, the champion of brand spoofing
22 December 2022

Beware of CryptosLabs, the champion of brand spoofing

Group-IB warns against the practices of this dreaded “scam-as-a-service” that has automated tools.
United States: Complaints after skimming of food aid
23 November 2022

United States: Complaints after skimming of food aid

In the United States, an association filed a complaint against the State of Massachusetts because of its failure to reimburse food aid funds stolen by skimming.
U.S. banks are failing to reimburse for instant payment fraud
04 November 2022

U.S. banks are failing to reimburse for instant payment fraud

A U.S. senator’s investigation reveals that major U.S. banks rarely reimburse instant payment service fraud
Digital identity & KYC
Digital identity as a national security priority in Morocco
06 January 2023

Digital identity as a national security priority in Morocco

When detailing his priorities for 2023, the Director General of the Moroccan National Security made a point of focusing on digital technology
European Digital Identity Wallet: pilot project awarded
06 January 2023

European Digital Identity Wallet: pilot project awarded

EU Digital Identity Wallet consortium to look at application to travel in 2023
The EU reaches agreement on the legal framework for its digital identity wallets
06 January 2023

The EU reaches agreement on the legal framework for its digital identity wallets

Digital ministers adopt a regulation guaranteeing interoperable and secure applications.
[Case Study] Idemia: The Kingdom of Morocco introduces a national digital ID program
07 November 2022

[Case Study] Idemia: The Kingdom of Morocco introduces a national digital ID program

The nation puts into effect its digitalization plan based on new eID cards to reinforce security and convenience for citizens. Discover Idemia’s Case Study on the subject, through the ...
Digital identity: towards the age of reason?
04 November 2022

Digital identity: towards the age of reason?

By Fabrice Deblock
Digital identity players are gradually getting their act together and the European regulatory framework is becoming more structured. Here is a close-up on a market that is gaining in maturity.
[Interview] Gregory Kuhlmey, IDEMIA: Biometrics in Digital Identity Wallet
11 October 2022

[Interview] Gregory Kuhlmey, IDEMIA: Biometrics in Digital Identity Wallet

By Richard Dalleau
The EU is going all in on its Digital Identity Wallet program. A project that is a source of both hope and worry. Digital Identity Wallet advances, protection privacy, international examples, the ...
Digital Sovereignty
How the EU wants to protect citizens and businesses from cyberattacks
23 January 2023

How the EU wants to protect citizens and businesses from cyberattacks

By Thomas Joos
The EU Commission wants to ensure that future challenges to the security of digital products in the private environment, but also at companies in the EU, are mastered as well as possible. This should ...
NIS2: New year, new European security rules
14 December 2022

NIS2: New year, new European security rules

By Rayna Stamboliyska
The heir to the NIS Directive has been adopted. NIS2 introduces far-reaching changes such as C-level criminal liability to ensure that economic actors take digital assets security seriously. ...
The European Health Data Space : which answers to which questions?
24 November 2022

The European Health Data Space : which answers to which questions?

By Rayna Stamboliyska
The draft regulation on the European Health Data Space (EHDS) is proposing a framework for sharing health data in Europe. It is questionable whether the legislation will meet the multiple challenges ...
The Cloud: how do we renew trust?
09 November 2022

The Cloud: how do we renew trust?

By Mériadec Raffray
Europeans have snapped out of their naivety, and they are now looking for the magic formula to secure their data without foregoing the efficiency of apps backed by American datacenters. France has ...
What is the Health Data Hub all about?
18 October 2022

What is the Health Data Hub all about?

By Valentin Przyluski
The Health Data Hub is a public entity responsible for simplifying and standardizing access to health data, while ensuring its control and security. It was created on the recommendation of the ...
The cybersecurity ecosystem fights for European digital sovereignty
18 October 2022

The cybersecurity ecosystem fights for European digital sovereignty

By Patricia Dreidemy
Is sovereignty a mission impossible or the Holy Grail of digital technology? Not so much, says Hexatrust, a group of innovative cloud and cybersecurity companies, who presented its “manifesto ...
Digital transition
Cybersecurity Maturity in the UAE: A fast and continuous improvement process
27 January 2023

Cybersecurity Maturity in the UAE: A fast and continuous improvement process

By Antoun Beyrouthy
The Emirate has been rapidly maturing in the cyber sector, both in the public and private sectors. It took the country only one year (from 2019 to 2020) to move from 33rd to 5th place, according to ...
Canada’s health records are woefully insecure
09 January 2023

Canada’s health records are woefully insecure

Report slams the authority responsible for managing British Columbia’s health data sharing platform
Is Africa the next cyber El Dorado?
13 December 2022

Is Africa the next cyber El Dorado?

By Richard Dalleau
Countries that are evolving and becoming aware of cyber issues, an Internet market that is soaring, but also geopolitical issues and major gaps to fill: Africa is a cyber market that is both ...
Cybersecurity, a new challenge for the construction industry
09 December 2022

Cybersecurity, a new challenge for the construction industry

By Georges Bonfils
The use of digital tools, from design offices to maintenance teams, means that smart buildings are exposed to cyber risks. What are these new types of threats? What are the solutions offered by ...
Ethics and compliance for the younger generation
06 December 2022

Ethics and compliance for the younger generation

By Fabrice Deblock
Regulatory compliance projects and the application of major ethical principles are both highly challenging issues for companies. Attracting the younger generation and mastering all the algorithms ...
Predictive analytics in cybersecurity: myth or reality?
22 November 2022

Predictive analytics in cybersecurity: myth or reality?

By Zachary Amos
Companies are finally using a technology that predicts data breaches before they happen — predictive analytics. Like a radar, telling you when an enemy is approaching, predictive analytics is used ...

Our
partners