The long march towards corporate digital responsibility
Digital transition

The long march towards corporate digital responsibility

Par RichardDalleau
Carbon footprint, ethics, data and human protection… More and more, digital players—and especially those in cybersecurity—are questioning their digital responsibility. During the FIC 2022, the closing plenary was even dedicated to this theme full of future promises…and pitfalls. inCyber takes stock.

Agenda

  • August, 10 2022 [Agenda]

    “Parallels”, FIC x Analog Sport exhibition

    This year, the International Cybersecurity Forum (FIC) is committed and goes beyond to help you discover the synergies between two worlds: cybersecurity and sport. On this occasion, come and discover “Parallels”, an ...
+

Vidéos

  • Cyber industrial safety
  • Security and Stability in Cyberspace
  • Cybercrime
  • Cyber risks
  • Operational security
  • Antifraud action
  • Digital identity & KYC
  • Digital Sovereignty
  • Digital transition
Cyber industrial safety
Biometric authentication: a model to follow?
25 July 2022

Biometric authentication: a model to follow?

Par Thomas Joos
Many industrial organisations use authentication methods to provide access to specific locations or to log into computers and services. On the flip side, 79% of organisations have experienced an ...
Black Basta ransomware: an emerging threat
18 July 2022

Black Basta ransomware: an emerging threat

The RaaS group Black Basta has reportedly claimed nearly 50 victims in the two months of its existence.
U.S.: $12m for cybersecurity research in the energy sector
1 June 2022

U.S.: $12m for cybersecurity research in the energy sector

The U.S. Department of Energy is awarding a $12 million grant to six university research teams working on the cybersecurity of energy systems.
India: Cyberattacks target oil refineries
1 June 2022

India: Cyberattacks target oil refineries

A study reveals that oil refineries in India suffered 3.6 million cyberattacks between October 2021 and April 2022.
21 U.S. LNG producers hacked
4 April 2022

21 U.S. LNG producers hacked

U.S. cybersecurity firm Resecurity recently revealed a massive hacking operation targeting 21 U.S. liquefied natural gas (LNG) producers.
The French food giant Avril victim of a cyberattack
24 November 2021

The French food giant Avril victim of a cyberattack

On 3 November 2021, the Avril group, victim of a cyberattack, decided to cut its IT network, causing a slowdown of its activity
Security and Stability in Cyberspace
The Special Operations Command (COS) in the cyberage
20 July 2022

The Special Operations Command (COS) in the cyberage

Par Mériadec Raffray
During the International Cybersecurity Forum (FIC), the COS launched its first cyber challenge: “Operation Kernel 3.0”. A discreet demonstration of its digital transformation, which ...
The U.S. confirms cyber actions in support of Ukraine
18 July 2022

The U.S. confirms cyber actions in support of Ukraine

In a recent interview, Paul Nakasone, Director of the NSA and Commander of the U.S. Cyber Command, admitted to conducting offensive and defensive cyber operations in support of Ukraine against ...
Cyberattacks: a month after declaring a state of emergency, what is the situation in Costa Rica?
11 July 2022

Cyberattacks: a month after declaring a state of emergency, what is the situation in Costa Rica?

Par Richard Dalleau
Last May, Costa Rica was the first country in the world to declare a state of emergency in order to respond to cyberattacks against its public services. Beyond the symbolic aspect that struck world ...
Cyber warfare: the Russians not up to par?
20 June 2022

Cyber warfare: the Russians not up to par?

Par Olivier Dujardin
In terms of cyberattacks and digital warfare, Russia has skills and resources that have been widely discussed and, on paper, it seems to be a major power in this area. However, the war in Ukraine has ...
Cyber alliance between the U.S., Japan, India and Australia
14 June 2022

Cyber alliance between the U.S., Japan, India and Australia

Joe Biden used his trip to Asia to forge a cyber alliance between the U.S., Japan, India and Australia.
Microsoft details hundreds of Russian cyberattacks on Ukraine
1 June 2022

Microsoft details hundreds of Russian cyberattacks on Ukraine

In a recent report, Microsoft draws a first assessment of the “hybrid war” led by Russia against Ukraine, where cyberattacks support and relay military offensives.
Cybercrime
By closing its showcase site, Conti completes its “self-dissolution”
18 July 2022

By closing its showcase site, Conti completes its “self-dissolution”

The showcase site of the ransomware group Conti is no longer accessible. This is the final step in its self-dissolution and spin-off into new, less identifiable gangs.
Black Basta ransomware: an emerging threat
18 July 2022

Black Basta ransomware: an emerging threat

The RaaS group Black Basta has reportedly claimed nearly 50 victims in the two months of its existence.
The Rise of Mobile Malware
4 July 2022

The Rise of Mobile Malware

Par Zachary Amos
It’s no secret that the world is becoming increasingly digital, especially after considering how many devices there are worldwide. Statista estimates that, by 2025, the number of mobile devices ...
Anonymous declares war on Russian Killnet hackers
14 June 2022

Anonymous declares war on Russian Killnet hackers

After declaring war on Russia in support of Ukraine, the cyberactivist group Anonymous is targeting Russian Killnet hackers.
How can we protect ourselves against network infrastructure sabotage?
14 June 2022

How can we protect ourselves against network infrastructure sabotage?

Par Xavier Biseul
At the end of April, an unprecedented series of malicious acts paralysed Internet traffic in several regions simultaneously. The investigation is ongoing, but industry federations are already calling ...
Switzerland: The number of reported cyber incidents doubled in 2021
1 June 2022

Switzerland: The number of reported cyber incidents doubled in 2021

The Swiss National Cyber Security Centre (NCSC) has compiled a study on the number of reports in 2021: they have doubled compared to 2020.
Cyber risks
Local authorities in the face of cybercrime
3 August 2022

Local authorities in the face of cybercrime

Par Patricia Dreidemy
Although the range of cybersecurity tools available to local authorities is growing, a great deal of work remains to be done to raise awareness, as certain shortcomings in the information systems of ...
Health, a sector under high (cyber) tension
3 August 2022

Health, a sector under high (cyber) tension

Par Sylvaine Luckx
The health crisis has increased the digitisation of the health sector, sometimes at breakneck speed. But despite active public policy, this sector remains under high cyber tension. The various ...
“Unsophisticated” attacks account for 90% of crypto theft
14 June 2022

“Unsophisticated” attacks account for 90% of crypto theft

Bishop Fox has studied the top thefts from blockchain and DeFi applications in 2021: 90% are the result of “unsophisticated attacks.”
Fighting deepfakes: a “top priority” for Europol
5 May 2022

Fighting deepfakes: a “top priority” for Europol

A report by the Europol Innovation Lab says that “deepfake prevention and detection” must be “top law enforcement priority.“
Cyberattacks and cognitive biases: what are our behaviours?
25 April 2022

Cyberattacks and cognitive biases: what are our behaviours?

Par Pascal Coillet-Matillon
A cyberattack often requires the attacker to deploy strategies that are intended to trigger expected reactions from the target. Some of these reactions are governed by cognitive biases.
Cybersecurity maturity of large organisations: “Could do better”
25 April 2022

Cybersecurity maturity of large organisations: “Could do better”

Par Patricia Dreidemy
There is still room for improvement in this area, as shown by the benchmark carried out by the consultancy firm Wavestone among more than 75 of its clients. It gives them an overall maturity score ...
Operational security
Cybersecurity & Formula 1, a role model
23 May 2022

Cybersecurity & Formula 1, a role model

Par Thomas Joos
Cybersecurity plays an important role in Formula 1. There is probably no other sport that is as digitized and engineered as this one. The high-profile and high-tech nature of Formula 1 makes it a ...
Critical asset protection in the Active Directory: What do you need to know?
25 April 2022

Critical asset protection in the Active Directory: What do you need to know?

Par Kévin Poireault
How can you protect your critical assets in Active Directory thanks to the privileged access workstations (or PAWs)? To understand the ins and outs, follow the advice of Sylvain Cortes, Security ...
600,000 U.S. cybersecurity jobs sit empty
11 April 2022

600,000 U.S. cybersecurity jobs sit empty

A recent analysis by CyberSeek confirms the shortage of cybersecurity talent in the U.S., with 600,000 unfilled positions for 1 million current employees.
$77.5 billion in cybersecurity M&As in 2021
28 February 2022

$77.5 billion in cybersecurity M&As in 2021

Momentum Cyber’s latest annual report on cybersecurity financing reveals a record $77.5 billion in total M&A activity in 2021.
Cybersecurity in India: the market almost doubled during the pandemic
28 February 2022

Cybersecurity in India: the market almost doubled during the pandemic

Par Fabrice Deblock
The pandemic has seen ransomware attacks explode in India, hitting the country’s businesses hard. Fortunately, the Indian ecosystem is getting organised and startups are gaining momentum, ...
Cloud: Google acquires cybersecurity startup Siemplify
26 January 2022

Cloud: Google acquires cybersecurity startup Siemplify

Google confirmed in early January 2022 that it had acquired Israeli cybersecurity startup Siemplify and integrated it into Google Cloud Security.
Antifraud action
First arrest for insider trading in NFTs
18 July 2022

First arrest for insider trading in NFTs

The FBI has arrested the former product manager of an NFT sales platform who allegedly took advantage of his position to buy crypto-assets before their value rose.
USA: 5 years in prison for an Estonian hacker specialising in financial fraud
11 April 2022

USA: 5 years in prison for an Estonian hacker specialising in financial fraud

A U.S. court has sentenced Maksim Berezan, an Estonian cybercriminal involved in 13 ransomware attacks and numerous financial frauds, to five years in prison.
Cryptocurrency: $14 billion in fraud in 2021
21 February 2022

Cryptocurrency: $14 billion in fraud in 2021

Financial analysis firm Chainalysis has just unveiled its 2021 cryptocurrency fraud assessment, which reaches $14 billion.
Russian “fraud king” cybercriminal sentenced
24 November 2021

Russian “fraud king” cybercriminal sentenced

The U.S. justice system has sentenced Aleksandr Zhukov—a Russian cybercriminal and self-proclaimed “king of online ad fraud—,” to 10 years in prison
U.S. seeks to strengthen global cooperation against cybercrime
25 October 2021

U.S. seeks to strengthen global cooperation against cybercrime

On 13-14 October 2021, U.S. President Joe Biden convened a virtual summit with officials from about 30 countries to accelerate cooperation in the fight against cybercrime, including on the issue of ...
Crypto-assets – New technologies can help combat AML/CFT
27 July 2021

Crypto-assets – New technologies can help combat AML/CFT

While Anti-Money Laundering/Combating the Financing of Terrorism international standards are in place, most jurisdictions have just begun to implement and enforce them. The supervision of ...
Digital identity & KYC
Biometric authentication: a model to follow?
25 July 2022

Biometric authentication: a model to follow?

Par Thomas Joos
Many industrial organisations use authentication methods to provide access to specific locations or to log into computers and services. On the flip side, 79% of organisations have experienced an ...
Getting Back Our Digital Identity – A Moonshot Proposal
24 May 2022

Getting Back Our Digital Identity – A Moonshot Proposal

Par Patrick W. Hearn
American digital identity has rocketed away from us. Since the 1990’s, it has been used by organizations who have treated us as nothing more than money-making data fields. It is time for Americans ...
How digital KYC is transforming business
16 May 2022

How digital KYC is transforming business

Par Marc Auxenfants
Formerly used to combat money laundering, “know your customer” (KYC) is expanding its scope and recurrence to become cyber-resilient. Previously a characteristic of the financial sector alone, ...
USA: towards a federal digital identity framework?
25 April 2022

USA: towards a federal digital identity framework?

In an open letter, identity security experts have urged U.S. President Joe Biden to deploy a federal digital identity framework by Executive Order.
Estonia supports UNHCR’s digital identity for refugees
16 December 2021

Estonia supports UNHCR’s digital identity for refugees

The UN High Commissioner for Refugees (UNHCR) detailed on 6 December 2021 how Estonia provided it with a digital identity specialist to accelerate its digital transformation.
UK to launch digital identity in April 2022
24 November 2021

UK to launch digital identity in April 2022

The UK government has said that the first version of its digital identity service—called One Login—is expected to go live in April 2022
Digital Sovereignty
Data governance: one of the pillars of digital trust
2 August 2022

Data governance: one of the pillars of digital trust

Par Nathalie Feingold
Digital trust is a fundamental issue for businesses that are becoming increasingly automated. Just how much can we trust machines to help us make our decisions, or to even make decisions for us ...
Let’s provide our ecosystem with the highest level of security!
27 July 2022

Let’s provide our ecosystem with the highest level of security!

Par David Chassan
For several years now in Europe, we, the players of the digital sector, have been aware that it is essential to put in place a demanding compliance framework to strengthen the trust of citizens, ...
Bleu and S3NS, the “sovereign” cloud offerings from Microsoft and Google
18 July 2022

Bleu and S3NS, the “sovereign” cloud offerings from Microsoft and Google

The joint ventures to provide SecNumCloud certified cloud offerings for Microsoft Azure (“Bleu”, with Capgemini and Orange) and Google (“S3NS”, with Thales) have been ...
European cyber sovereignty: dream or reality?
4 July 2022

European cyber sovereignty: dream or reality?

Par Pascal Coillet-Matillon
The more Europe falls victim to cybercrime, the more it tends to set itself up as a true sovereign power in the field of cybersecurity to better defend itself. This was the conclusion drawn by the ...
Money, Money, Money
29 June 2022

Money, Money, Money

Par Apolline Rolland
This article is based on discussions of the event “Million Euro Baby: What’s next for EU funding in cybersecurity?” held in Brussels by FIC on April 25, 2022, which brought together a panel of ...
Privacy shield : is it really necessary to get out of the current ambiguity?
24 June 2022

Privacy shield : is it really necessary to get out of the current ambiguity?

Par Guillaume TISSIER
On July 16, 2020, in its “Schrems 2” decision, the Court of Justice of the European Union nullified the Privacy Shield, i.e. the adequacy decision guaranteeing European citizens’ personal data ...
Digital transition
The long march towards corporate digital responsibility
3 August 2022

The long march towards corporate digital responsibility

Par Richard Dalleau
Carbon footprint, ethics, data and human protection… More and more, digital players—and especially those in cybersecurity—are questioning their digital responsibility. During the FIC 2022, ...
[Interview] Guy Gourevitch: “It is urgent to fill the cracks”
18 July 2022

[Interview] Guy Gourevitch: “It is urgent to fill the cracks”

Par Mériadec Raffray
The former president (2019-2021) of France Angels—the national federation of business angels (5,500 active angels in 65 networks)—has just launched two tools designed to improve the supply of ...
Who are the budding French cyber talents?
18 July 2022

Who are the budding French cyber talents?

Par Mériadec Raffray
Although difficult to approach and not very fond of media exposure, young ethical hackers lent themselves to the game of questions and answers during the European Cyber Cup (EC2), organised as part ...
How to monitor algorithms
23 June 2022

How to monitor algorithms

Par Georges Bonfils
The misuse of a fraud prevention algorithm by Dutch authorities led to widespread discrimination. A story that triggered a national scandal and serves as a reminder of the importance of tools to ...
Securing the Metaverse: The Gulf’s Real-World Challenges for a Fictional Universe
5 June 2022

Securing the Metaverse: The Gulf’s Real-World Challenges for a Fictional Universe

Par Antoun Beyrouthy
Countries in the GCC are leading the adoption of the Metaverse in multiple fields. However, this new and exciting digital breakthrough brings with it new security challenges, especially for adopters ...
The shadow of social credit looms over Europe
19 May 2022

The shadow of social credit looms over Europe

Par Richard Dalleau
It rules the lives of 1.4 billion Chinese people. It shapes the thoughts of 330 million Americans. In different forms, social credit is gaining ground at the heart of a European continent still ...

Our
partners