Image Local authorities in the face of cybercrime
Risks management
08.03.22 Risks management
Local authorities in the face of cybercrime
Read
06
MIN
Image The long march towards corporate digital responsibility
Digital transformation
The long march towards corporate digital responsibility
Read
08
MIN
Image Health, a sector under high (cyber) tension
Risks management
08.03.22 Risks management
Health, a sector under high (cyber) tension
Read
08
MIN
Image How can industrial companies ensure the cybersecurity of their supply chain?
Industry and OT
07.25.22 Industry and OT
How can industrial companies ensure the cybersecurity of their supply chain?
Read
07
MIN
Image Biometric authentication: a model to follow?
Digital identity
07.25.22 Digital identity
Biometric authentication: a model to follow?
Read
06
MIN
Image First arrest for insider trading in NFTs
Fraud
07.18.22 Fraud
First arrest for insider trading in NFTs
Read
02
MIN
Image Bleu and S3NS, the "sovereign" cloud offerings from Microsoft and Google
Digital Sovereignty
Bleu and S3NS, the “sovereign” cloud offerings from Microsoft and Google
Read
02
MIN
Image By closing its showcase site, Conti completes its "self-dissolution"
Cybercrime
07.18.22 Cybercrime
By closing its showcase site, Conti completes its “self-dissolution”
Read
01
MIN
Image The U.S. confirms cyber actions in support of Ukraine
Cyber stability
07.18.22 Cyber stability
The U.S. confirms cyber actions in support of Ukraine
Read
01
MIN
Image Black Basta ransomware: an emerging threat
Cybercrime
07.18.22 Cybercrime
Black Basta ransomware: an emerging threat
Read
01
MIN
Image Cyberattacks: a month after declaring a state of emergency, what is the situation in Costa Rica?
Cyber stability
07.11.22 Cyber stability
Cyberattacks: a month after declaring a state of emergency, what is the situation in Costa Rica?
Read
06
MIN
Image The Rise of Mobile Malware
Cybercrime
07.04.22 Cybercrime
The Rise of Mobile Malware
Read
06
MIN
Image European cyber sovereignty: dream or reality?
Digital Sovereignty
European cyber sovereignty: dream or reality?
Read
06
MIN
Image [FIC 2022] A look back at the OSINT & Cyber Investigation Day
06.27.22
FIC 2022 A look back at the OSINT & Cyber Investigation Day
Read
07
MIN
Image Panorama of cyber innovation - 2022 FIC Startup Award
06.27.22
Panorama of cyber innovation – 2022 FIC Startup Award
Read
01
MIN
Image Privacy shield : is it really necessary to get out of the current ambiguity?
Digital Sovereignty
Privacy shield : is it really necessary to get out of the current ambiguity?
Read
03
MIN
Image How to monitor algorithms
Digital transformation
How to monitor algorithms
Read
08
MIN
Image Semiconductors: Spain invests €12.25 billion
06.14.22
Semiconductors: Spain invests €12.25 billion
Read
01
MIN
Image Cyber alliance between the U.S., Japan, India and Australia
Cyber stability
06.14.22 Cyber stability
Cyber alliance between the U.S., Japan, India and Australia
Read
02
MIN
Image "Unsophisticated" attacks account for 90% of crypto theft
Risks management
06.14.22 Risks management
“Unsophisticated” attacks account for 90% of crypto theft
Read
02
MIN
Image Anonymous declares war on Russian Killnet hackers
Cybercrime
06.14.22 Cybercrime
Anonymous declares war on Russian Killnet hackers
Read
01
MIN