Image Cloud Sovereignty: How Berlin and Paris Are Trying to Draw a European Line
Digital Sovereignty
Cloud Sovereignty: How Berlin and Paris Are Trying to Draw a European Line
Read
14
MIN
Image Cloud Sovereignty Framework: when the devil is in the details
Digital Sovereignty
Cloud Sovereignty Framework: when the devil is in the details
Read
04
MIN
Image Cyber Risk Quantification (CRQ): Deciphering Financial Exposure to Better Prioritize Cybersecurity Investments
Cybersecurity
11.12.25 Cybersecurity
Cyber Risk Quantification (CRQ): Deciphering Financial Exposure to Better Prioritize Cybersecurity Investments
Read
09
MIN
Image United Kingdom: the drinking water network targeted by five cyberattacks since early 2024
Industry and OT
11.10.25 Industry and OT
United Kingdom: the drinking water network targeted by five cyberattacks since early 2024
Read
01
MIN
Image United States: a “foreign actor” hacked the Congressional Budget Office
Cybersecurity
11.10.25 Cybersecurity
United States: a “foreign actor” hacked the Congressional Budget Office
Read
01
MIN
Image European police forces dismantle major credit card fraud network
Fraud
11.07.25 Fraud
European police forces dismantle major credit card fraud network
Read
01
MIN
Image Federal report questions Canada’s digital sovereignty
Digital Sovereignty
Federal report questions Canada’s digital sovereignty
Read
01
MIN
Image Pro-Russian group Curly COMrades used virtual machines to compromise systems
Cybercrime
11.07.25 Cybercrime
Pro-Russian group Curly COMrades used virtual machines to compromise systems
Read
01
MIN
Image 2026, a year of major cyber threats according to Google
Cybersecurity
11.07.25 Cybersecurity
2026, a year of major cyber threats according to Google
Read
01
MIN
Image The FIGs: An economic power serving U.S. tech?
Digital Sovereignty
The FIGs: An economic power serving U.S. tech?
Read
06
MIN
Image Regulating the Digital World, Protecting Youth: The Challenge of the Trust & Safety Forum 2026
Digital transformation
Regulating the Digital World, Protecting Youth: The Challenge of the Trust & Safety Forum 2026
Read
02
MIN
Image Cisco Talos warns about attacks from the Russian-speaking RaaS group Qilin
Cyber +
10.30.25 Cyber +
Cisco Talos warns about attacks from the Russian-speaking RaaS group Qilin
Read
01
MIN
Image European Commission accuses TikTok and Meta of violating the Digital Services Act
Digital transformation
European Commission accuses TikTok and Meta of violating the Digital Services Act
Read
01
MIN
Image From Factory of the World to Tech Giant: The Drivers of China’s Rise
Digital transformation
From Factory of the World to Tech Giant: The Drivers of China’s Rise
Read
06
MIN
Image Scattered Lapsus$ Hunters Threatens to Leak Data of Thousands of U.S. Officials
Cybercrime
10.23.25 Cybercrime
Scattered Lapsus$ Hunters Threatens to Leak Data of Thousands of U.S. Officials
Read
01
MIN
Image Ransomware: according to CrowdStrike, paying the ransom proves ineffective in most cases
Cybercrime
10.23.25 Cybercrime
Ransomware: according to CrowdStrike, paying the ransom proves ineffective in most cases
Read
01
MIN
Image How GPS jamming works and how to guard against it
Cyber +
10.21.25 Cyber +
How GPS jamming works and how to guard against it
Read
06
MIN
Image European Cybersecurity Reserve: The Union Builds a Common Shield
Cybersecurity
10.20.25 Cybersecurity
European Cybersecurity Reserve: The Union Builds a Common Shield
Read
04
MIN
Image Troll Farms: The Mercenaries of Online Disinformation?
Cybercrime
10.19.25 Cybercrime
Troll Farms: The Mercenaries of Online Disinformation?
Read
06
MIN
Image SMEs and Mid-Sized Companies: How to Structure a Cybersecurity Policy
Cybersecurity
10.17.25 Cybersecurity
SMEs and Mid-Sized Companies: How to Structure a Cybersecurity Policy
Read
04
MIN
Image Stéphane Tournadre, CISO of Servier Group, a builder of digital fortresses
Cybersecurity
10.16.25 Cybersecurity
Stéphane Tournadre, CISO of Servier Group, a builder of digital fortresses
Read
04
MIN