Image Ransomware - Crisis Management at the Heart of Resilience
Risks management
10.10.22 Risks management
Ransomware – Crisis Management at the Heart of Resilience
Read
04
MIN
Image The cybersecurity ecosystem fights for European digital sovereignty
Digital Sovereignty
The cybersecurity ecosystem fights for European digital sovereignty
Read
08
MIN
Image Joe Biden’s plan to regulate digital assets
Cybercrime
09.23.22 Cybercrime
Joe Biden’s plan to regulate digital assets
Read
01
MIN
Image Online bank Revolut suffers data breach
Cybercrime
09.23.22 Cybercrime
Online bank Revolut suffers data breach
Read
01
MIN
Image Canada hit by 75 geopolitical cyber-incidents since 2010
Cyber stability
09.23.22 Cyber stability
Canada hit by 75 geopolitical cyber-incidents since 2010
Read
02
MIN
Image Tips for Effective Leadership During a Cyberattack
Risks management
09.20.22 Risks management
Tips for Effective Leadership During a Cyberattack
Read
08
MIN
Image 2022 FIFA World Cup: Qatar’s Cybersecurity Measures
Secops
09.20.22 Secops
2022 FIFA World Cup: Qatar’s Cybersecurity Measures
Read
12
MIN
Image How do we facilitate the building of datacenters in France?
Digital transformation
How do we facilitate the building of datacenters in France?
Read
09
MIN
Image [Questions about the metaverse. Episode 2]. How can we regulate toxic behaviour?
Digital transformation
Questions about the metaverse. Episode 2. How can we regulate toxic behaviour?
Read
07
MIN
Image Israel: pro-Palestine hacktivists hack SCADA/ICS controllers
Industry and OT
09.15.22 Industry and OT
Israel: pro-Palestine hacktivists hack SCADA/ICS controllers
Read
01
MIN
Image [Questions about the metaverse. Episode 1]  Sexual assault: time for action
Digital transformation
Questions about the metaverse. Episode 1 Sexual assault: time for action
Read
05
MIN
Image Albania Cyberattack: Tirana accuses Iran
Cyber stability
09.13.22 Cyber stability
Albania Cyberattack: Tirana accuses Iran
Read
01
MIN
Image Deception as a defensive tool
Cybercrime
09.12.22 Cybercrime
Deception as a defensive tool
Read
04
MIN
Image [FIC 2023 theme] In Cloud we trust?
Digital transformation
FIC 2023 theme In Cloud we trust?
Read
02
MIN
Image Twitter: "extreme deficiencies" in security
Risks management
09.07.22 Risks management
Twitter: “extreme deficiencies” in security
Read
02
MIN
Image A phishing campaign from a legitimate PayPal Business account
Cybercrime
09.07.22 Cybercrime
A phishing campaign from a legitimate PayPal Business account
Read
02
MIN
Image [Europe calling] Is Resilience Within Reach?
Digital Sovereignty
Europe calling Is Resilience Within Reach?
Read
05
MIN
Image From WarGames to Mr. Robot: when hackers take over the big and small screens
Cybercrime
09.02.22 Cybercrime
From WarGames to Mr. Robot: when hackers take over the big and small screens
Read
07
MIN
Image Ukraine: a Cyber War Story
Cyber stability
09.02.22 Cyber stability
Ukraine: a Cyber War Story
Read
05
MIN
Image The French are aware of cyber risks but… are they truly responsible?
Risks management
08.03.22 Risks management
The French are aware of cyber risks but… are they truly responsible?
Read
06
MIN
Image Local authorities in the face of cybercrime
Risks management
08.03.22 Risks management
Local authorities in the face of cybercrime
Read
06
MIN