Image The quest for reliable and secure source code [by Sebastien Giora, Advens]
Secops
07.02.15 Secops
The quest for reliable and secure source code by Sebastien Giora, Advens
Read
04
MIN
Image Conference "Supporting cybersecurity startups in Europe: overview & best practices", June 10th in Bruxelles
06.10.15
Conference “Supporting cybersecurity startups in Europe: overview & best practices”, June 10th in Bruxelles
Read
02
MIN
Image Sovereign OS: the Holy Grail of digital sovereignty? [by Guillaume Tissier, CEIS]
Cyber stability
05.21.15 Cyber stability
Sovereign OS: the Holy Grail of digital sovereignty? by Guillaume Tissier, CEIS
Read
03
MIN
Image Global Online Fraud Losses = 140,000 Jobs [by Fabrice Colas, Ubivar]
Cybercrime
05.12.15 Cybercrime
Global Online Fraud Losses = 140,000 Jobs by Fabrice Colas, Ubivar
Read
05
MIN
Image The risk of a major flood in the the Ile-de-France region is also a challenge in terms of Information Systems Security [by Vincent Balouet, maitrisedesrisques.com]
Secops
05.12.15 Secops
The risk of a major flood in the the Ile-de-France region is also a challenge in terms of Information Systems Security by Vincent Balouet, maitrisedesrisques.com
Read
10
MIN
Image Conclusion to Symantec's annual report on Internet security threats [by Laurent Heslault, Symantec]
Cybercrime
05.12.15 Cybercrime
Conclusion to Symantec’s annual report on Internet security threats by Laurent Heslault, Symantec
Read
04
MIN
Image The first FIC 2016 scientific committee held on April 14, 2015
05.12.15
The first FIC 2016 scientific committee held on April 14, 2015
Read
01
MIN
Image Review of the FIC observatory breakfast: Is e-commerce a precursor to the fight against digital identity fraud?
05.12.15
Review of the FIC observatory breakfast: Is e-commerce a precursor to the fight against digital identity fraud?
Read
03
MIN
Image FIC Observatory Breakfast Talk : « E-commerce, the precursor to the fight against digital identity fraud ? »
04.14.15
FIC Observatory Breakfast Talk : « E-commerce, the precursor to the fight against digital identity fraud ? »
Read
01
MIN
Image Personal data: a cornerstone of sovereignty? [by Loïs Samain, CEIS]
Cyber stability
04.07.15 Cyber stability
Personal data: a cornerstone of sovereignty? by Loïs Samain, CEIS
Read
07
MIN
Image The FIC 2016 will take place on 25-26 January 2016 and focus on the overarching theme of data security & privacy
04.07.15
The FIC 2016 will take place on 25-26 January 2016 and focus on the overarching theme of data security & privacy
Read
04
MIN
Image [Contribution] Which strategy should you adopt to boost your SOC's in-house appeal? [by Thomas Girard, CS]
Cyber stability
04.07.15 Cyber stability
Contribution Which strategy should you adopt to boost your SOC’s in-house appeal? by Thomas Girard, CS
Read
05
MIN
Image Next FIC Breakfast on "Security and mobility"
03.11.15
Next FIC Breakfast on “Security and mobility”
Read
01
MIN
Image Accelerating the business of cybersecurity [by Vincent Riou, CEIS]
Risks management
02.18.15 Risks management
Accelerating the business of cybersecurity by Vincent Riou, CEIS
Read
06
MIN
Image The Sony Pictures Entertainment Case : The employees’ low-profile initiative
Secops
01.15.15 Secops
The Sony Pictures Entertainment Case : The employees’ low-profile initiative
Read
01
MIN
Image [Contribution] Why CerberHost? Because your sites are vulnerable... [by Emile Heitor, CTO, NBS Systems]
Cybercrime
01.12.15 Cybercrime
Contribution Why CerberHost? Because your sites are vulnerable… by Emile Heitor, CTO, NBS Systems
Read
02
MIN
Image [Contribution] Closing the door to attackers with continued security and the Cloud [by Philippe Courtot, Qualys]
Cybercrime
01.12.15 Cybercrime
Contribution Closing the door to attackers with continued security and the Cloud by Philippe Courtot, Qualys
Read
01
MIN
Image [Contribution] Evolve or Die: Security Adaptation in a Virtual World [by Bitdefender]
Secops
01.05.15 Secops
Contribution Evolve or Die: Security Adaptation in a Virtual World by Bitdefender
Read
02
MIN
Image Who’s Afraid of Cybercrime? Law Enforcement Must Combat Cybercrime by Thinking and Acting Like a Cybercriminal
Cybercrime
01.05.15 Cybercrime
Who’s Afraid of Cybercrime? Law Enforcement Must Combat Cybercrime by Thinking and Acting Like a Cybercriminal
Read
09
MIN
Image [Contribution] Whitenoise, Dynamic Identity Verification and Authentication and Dynamic Distributed Key Infrastructures [by André Jacques Brisson, Whitenoise Laboratories Canada Inc]
Secops
01.05.15 Secops
Contribution Whitenoise, Dynamic Identity Verification and Authentication and Dynamic Distributed Key Infrastructures by André Jacques Brisson, Whitenoise Laboratories Canada Inc
Read
10
MIN
Image Are you ready for the next attack? [By Symantec]
Secops
12.23.14 Secops
Are you ready for the next attack? By Symantec
Read
05
MIN