News and Cyber Community
  • Contributors
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
inCyber
  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
https://incyber.org/wp-content/uploads/2021/07/logo-fic-europe.png

The leading
event on Digital security
and trust issues

Read more
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
InCyber
  • Events
  • Business
  • Nominees
  • Talents
  • Opinion
  • Publications
  • Videos
InCyber
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
News and Cyber Community
  • Contributors
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
inCyber
  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC

Search results for ""

Filter by topic

  • Cybersecurity Maturity in the UAE: A fast and continuous improvement process
    Digital transition

    Cybersecurity Maturity in the UAE: A fast and continuous improvement process

    The Emirate has been rapidly maturing in the cyber sector, both in the public and private sectors. It took the country only one year (from 2019 to 2020) to move from 33rd to 5th place, according to the Global Cyber Security Index.

  • How the EU wants to protect citizens and businesses from cyberattacks
    Digital Sovereignty

    How the EU wants to protect citizens and businesses from cyberattacks

    The EU Commission wants to ensure that future challenges to the security of digital products in the private environment, but also at companies in the EU, are mastered as well as possible. This should prevent cyber criminals and other actors from being able to carry out successful attacks via the products in order to harm citizens and companies.

  • Everchanging cyberthreats in the energy sector
    Cyber industrial safety

    Everchanging cyberthreats in the energy sector

    APT-type attacks, widely covered hacktivist acts, cybercriminal ransomware… Businesses in the energy sector must grasp the extent of the challenges they face.

  • FIC 2023: the detailed programme
    Agenda - Event

    FIC 2023: the detailed programme

    The 2023 edition of the International Cybersecurity Forum (FIC) will be held in Lille Grand Palais on 5, 6 and 7 April

  • The protection of citizens and children on the Internet, a priority issue in 2023
    Cyber risks | Opinions

    The protection of citizens and children on the Internet, a priority issue in 2023

    2022 will have seen another explosion in the number of Internet scams. Hackers are becoming more and more professional. They also use all the communication means at their disposal by exploiting our weaknesses and technological flaws. Today, it is clear that our children are increasingly exposed. In a very tense global context, it is time for politicians to put the protection of citizens, and especially children, at the top of their priorities.

  • From Ukraine to Pakistan, a journey to the heart of Internet geopolitics
    Security and Stability in Cyberspace

    From Ukraine to Pakistan, a journey to the heart of Internet geopolitics

    The Internet is a constrained space, with its own bottlenecks, center and periphery, its land and sea powers. This is one of the conclusions of the colloquium on the geopolitics of Internet routes held on December 16, 2022. The GEODE research center gathered a rich sample of academics and professionals to talk about Ukraine, sovereignty, and the future of the Internet. An overview.

  • [OneTrust] The many aspects of GRC platforms (Governance, Risk and Compliance)
    Cyber risks

    [OneTrust] The many aspects of GRC platforms (Governance, Risk and Compliance)

    Covering a wide variety of risks, what are known as “GRC” solutions allow businesses to deal with conventional and emerging risks that affect them, all the while correcting vulnerabilities and reducing potential risks.

  • $4.8 million to train cybersecurity experts at the University of Oregon
    Operational security

    $4.8 million to train cybersecurity experts at the University of Oregon

    This National Science Foundation grant is designed to help the US fill its cybersecurity workforce shortage

  • US nuclear research labs targeted by Russian cybercriminals
    Security and Stability in Cyberspace

    US nuclear research labs targeted by Russian cybercriminals

    The Cold River group reportedly launched phishing attacks against three research centres in summer 2022, including one specialising in nuclear weaponry

  • Free decryption key for MegaCortex
    Cybercrime

    Free decryption key for MegaCortex

    Bitdefender, working with Europol, the Swiss authorities and the No More Ransom project, has made this cyber defence tool available online

  • Cybercriminals are also using ChatGPT
    Cyber risks

    Cybercriminals are also using ChatGPT

    OpenAI’s chat tool is adept at crafting phishing and malware messages

  • Israeli spyware targets security cameras
    Cyber risks

    Israeli spyware targets security cameras

    Sold only to state organisations, it can be used to take control of these cameras and even modify recordings

  • 12345…1020304050…>

Didn't find what you're looking for?

Search again.

InCyber
  • Linkedin
  • Twitter
  • Youtube
PRIVACY POLICY TERMS AND CONDITIONS COPYRIGHT © 2022 BY FIC, INC. ALL RIGHTS RESERVED.
News and Cyber Community
  • Events
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
Manage cookie consent
Pour offrir les meilleures expériences, nous utilisons des technologies telles que les cookies pour stocker et/ou accéder aux informations des appareils. Le fait de consentir à ces technologies nous permettra de traiter des données telles que le comportement de navigation ou les ID uniques sur ce site. Le fait de ne pas consentir ou de retirer son consentement peut avoir un effet négatif sur certaines caractéristiques et fonctions.
Fonctionnel Always active
Le stockage ou l’accès technique est strictement nécessaire dans la finalité d’intérêt légitime de permettre l’utilisation d’un service spécifique explicitement demandé par l’abonné ou l’utilisateur, ou dans le seul but d’effectuer la transmission d’une communication sur un réseau de communications électroniques.
Préférences
Storage or technical access is necessary for the purpose of legitimate interest to store preferences that are not requested by the subscriber or user.
Statistiques
Le stockage ou l’accès technique qui est utilisé exclusivement à des fins statistiques. Le stockage ou l’accès technique qui est utilisé exclusivement dans des finalités statistiques anonymes. En l’absence d’une assignation à comparaître, d’une conformité volontaire de la part de votre fournisseur d’accès à internet ou d’enregistrements supplémentaires provenant d’une tierce partie, les informations stockées ou extraites à cette seule fin ne peuvent généralement pas être utilisées pour vous identifier.
Marketing
Le stockage ou l’accès technique est nécessaire pour créer des profils d’utilisateurs afin d’envoyer des publicités, ou pour suivre l’utilisateur sur un site web ou sur plusieurs sites web ayant des finalités marketing similaires.
Manage options Manage services Manage vendors Read more about these purposes
Voir les préférences
{title} {title} {title}