Image Thierry Breton and the construction of the European digital landscape
Digital Sovereignty
Thierry Breton and the construction of the European digital landscape
Read
05
MIN
Image Russia's offensive on "digital sovereignty" in Africa
Cyber stability
04.12.24 Cyber stability
Russia’s offensive on “digital sovereignty” in Africa
Read
06
MIN
Image Cahiers inCyber : "In Cloud We Trust"
Cyber +
04.10.24 Cyber +
Cahiers inCyber : “In Cloud We Trust”
Read
01
MIN
Image Child privacy and protection: finding the right balance in the fight against dangerous sexual content
Risks management
04.09.24 Risks management
Child privacy and protection: finding the right balance in the fight against dangerous sexual content
Read
04
MIN
Image PhilosoFIC:are generative algorithms accelerators or the gravediggers of human intelligence?
Digital transformation
PhilosoFIC:are generative algorithms accelerators or the gravediggers of human intelligence?
Read
06
MIN
Image Artificial Intelligence: What are the 5 major cyber threats for 2024?
Risks management
03.20.24 Risks management
Artificial Intelligence: What are the 5 major cyber threats for 2024?
Read
03
MIN
Image NIS2, DORA and CRA: 3 upcoming mutations in the cyber landscape
Digital transformation
NIS2, DORA and CRA: 3 upcoming mutations in the cyber landscape
Read
03
MIN
Image Jean-Jacques Latour: "To date, we have not identified any new threat linked to artificial intelligence"
Risks management
03.18.24 Risks management
Jean-Jacques Latour: “To date, we have not identified any new threat linked to artificial intelligence”
Read
06
MIN
Image Grand Est : a dynamic, structured ecosystem
Cybersecurity
03.15.24 Cybersecurity
Grand Est : a dynamic, structured ecosystem
Read
05
MIN
Image Storage must form the core of an enterprise cybersecurity strategy
Risks management
03.14.24 Risks management
Storage must form the core of an enterprise cybersecurity strategy
Read
05
MIN
Image Cybersecurity specialist: a profession under mounting pressure
Digital transformation
Cybersecurity specialist: a profession under mounting pressure
Read
07
MIN
Image Cloud Sprawl Is Making Businesses Vulnerable to Cyberattacks
Secops
03.11.24 Secops
Cloud Sprawl Is Making Businesses Vulnerable to Cyberattacks
Read
05
MIN
Image Government administration: France and Germany join forces to develop sovereign tools
Digital Sovereignty
Government administration: France and Germany join forces to develop sovereign tools
Read
02
MIN
Image Israel-Hamas cyberwar : Google emphasizes key role of Iran
Cyber stability
03.05.24 Cyber stability
Israel-Hamas cyberwar : Google emphasizes key role of Iran
Read
02
MIN
Image Nuclear power: EDF entrusts part of its cloud to AWS
Digital Sovereignty
Nuclear power: EDF entrusts part of its cloud to AWS
Read
02
MIN
Image iMessage, Bing and Edge will not be subject to DMA
Digital Sovereignty
iMessage, Bing and Edge will not be subject to DMA
Read
02
MIN
Image Russian intelligence agent at the heart of cybercriminal forum
Cybercrime
03.05.24 Cybercrime
Russian intelligence agent at the heart of cybercriminal forum
Read
02
MIN
Image Law enforcement from eleven countries take LockBit offline
Cybercrime
03.05.24 Cybercrime
Law enforcement from eleven countries take LockBit offline
Read
02
MIN
Image ECHR defends conversation encryption
Digital transformation
ECHR defends conversation encryption
Read
02
MIN
Image Tech giants make commitment against political deepfakes
Risks management
03.05.24 Risks management
Tech giants make commitment against political deepfakes
Read
02
MIN
Image Vulnerability identified in Rhysida ransomware
Risks management
03.05.24 Risks management
Vulnerability identified in Rhysida ransomware
Read
02
MIN