Image Industry 4.0 and IIoT Security: Strategies for a Resilient Future
Industry and OT
05.09.24 Industry and OT
Industry 4.0 and IIoT Security: Strategies for a Resilient Future
Read
05
MIN
Image [Change HealthCare:] ransomware attack cost 872 million dollars 
Cybercrime
05.03.24 Cybercrime
Change HealthCare: ransomware attack cost 872 million dollars 
Read
02
MIN
Image Network device hack made it possible to spy on governments
Cyber stability
05.03.24 Cyber stability
Network device hack made it possible to spy on governments
Read
01
MIN
Image Are ZPMC’s Chinese dock cranes [spying] on the United States?
Industry and OT
05.02.24 Industry and OT
Are ZPMC’s Chinese dock cranes spying on the United States?
Read
02
MIN
Image Europol, CISA and FBI issue warning on Akira ransomware gang 
Risks management
05.02.24 Risks management
Europol, CISA and FBI issue warning on Akira ransomware gang 
Read
02
MIN
Image Akamai to buy Noname Security for 500 million dollars
Secops
04.23.24 Secops
Akamai to buy Noname Security for 500 million dollars
Read
01
MIN
Image CNIL and AI: Understand, Support and Control
Cyber stability
04.23.24 Cyber stability
CNIL and AI: Understand, Support and Control
Read
07
MIN
Image Thierry Breton and the construction of the European digital landscape
Digital Sovereignty
Thierry Breton and the construction of the European digital landscape
Read
05
MIN
Image Russia's offensive on "digital sovereignty" in Africa
Cyber stability
04.12.24 Cyber stability
Russia’s offensive on “digital sovereignty” in Africa
Read
06
MIN
Image Cahiers inCyber : "In Cloud We Trust"
Cyber +
04.10.24 Cyber +
Cahiers inCyber : “In Cloud We Trust”
Read
01
MIN
Image Child privacy and protection: finding the right balance in the fight against dangerous sexual content
Risks management
04.09.24 Risks management
Child privacy and protection: finding the right balance in the fight against dangerous sexual content
Read
04
MIN
Image PhilosoFIC:are generative algorithms accelerators or the gravediggers of human intelligence?
Digital transformation
PhilosoFIC:are generative algorithms accelerators or the gravediggers of human intelligence?
Read
06
MIN
Image Artificial Intelligence: What are the 5 major cyber threats for 2024?
Risks management
03.20.24 Risks management
Artificial Intelligence: What are the 5 major cyber threats for 2024?
Read
03
MIN
Image NIS2, DORA and CRA: 3 upcoming mutations in the cyber landscape
Digital transformation
NIS2, DORA and CRA: 3 upcoming mutations in the cyber landscape
Read
03
MIN
Image Jean-Jacques Latour: "To date, we have not identified any new threat linked to artificial intelligence"
Risks management
03.18.24 Risks management
Jean-Jacques Latour: “To date, we have not identified any new threat linked to artificial intelligence”
Read
06
MIN
Image Grand Est : a dynamic, structured ecosystem
Cybersecurity
03.15.24 Cybersecurity
Grand Est : a dynamic, structured ecosystem
Read
05
MIN
Image Storage must form the core of an enterprise cybersecurity strategy
Risks management
03.14.24 Risks management
Storage must form the core of an enterprise cybersecurity strategy
Read
05
MIN
Image Cybersecurity specialist: a profession under mounting pressure
Digital transformation
Cybersecurity specialist: a profession under mounting pressure
Read
07
MIN
Image Cloud Sprawl Is Making Businesses Vulnerable to Cyberattacks
Secops
03.11.24 Secops
Cloud Sprawl Is Making Businesses Vulnerable to Cyberattacks
Read
05
MIN
Image Government administration: France and Germany join forces to develop sovereign tools
Digital Sovereignty
Government administration: France and Germany join forces to develop sovereign tools
Read
02
MIN
Image Israel-Hamas cyberwar : Google emphasizes key role of Iran
Cyber stability
03.05.24 Cyber stability
Israel-Hamas cyberwar : Google emphasizes key role of Iran
Read
02
MIN