Search
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique





















Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

CYBER-SECURITY
 
 
 
 
 
CYBER-SECURITY
 
 
PRIME TIME Service

White Paper CommScope: Designing Infrastructure for the Cloud

In cloud-based data centres, physical layer performance is paramount. Without a physical infrastructure that delivers all (...)

Next...

Outdated energy, water and transport Industrial Control Systems without sufficient cyber security controls require coordinated testing of capability at EU levels, says the EU’s cyber security Agency ENISA

Today, the EU’s cyber security Agency ENISA published a new report to give advice regarding the next steps towards coordinated (...)

Next...

From transparency to trust in the Cloud: EU Cyber security Agency ENISA advises how to implement incident reporting in cloud computing

ENISA underlines the importance of incident reporting in cloud computing, particularly in critical sectors, as a way to (...)

Next...

Feature

Opinion Tuesday 31 March
Darren Anstee, Arbor Networks: Enjoy the view – today’s security landscape

From the attack on Sony to the Heartbleed vulnerability – we saw it all last year, and the continued proliferation of high-profile media stories (...)

Next...

Opinion Tuesday 24 March
Isabelle Renard, Attorney, Paris ba, PhD Engineering: The downside of being a connected business

The multiple facets of the digital environment provide tremendous opportunities for businesses. It allows them, by making intelligent use of (...)

Next...

Opinion Tuesday 17 March
Data security - top tips for senior managers

The networking environment has changed radically in recent times. In today’s world of increasing wireless use, widespread BYOD, more home working, (...)

Next...

Opinion Tuesday 17 March
Open-letter of La Quadrature du Net to the members of the JURI committee of the European Parliament in support of the Reda Report on copyright reform

On 23 and 24 March 2015, you will examine the proposed amendements to the report of MEP Julia Reda on the reform of the directive on copyright. (...)

Next...

Opinion Monday 16 March
Ulf Mattsson, Chief Technology Officer, Protegrity: Multiple Tokenization Schemes Meet the Merchant

Tokenization is used to solve many different problems, which explains the existence of several models. Merchants who tokenize their card data (...)

Next...

Special Reports Friday 13 March
EMEA External Storage Market Buoyant in 2014Q4 Thanks to Emerging Markets, According to IDC

The external disk storage systems market in Europe, the Middle East, and Africa (EMEA) was up 1.3% year over year in terms of user value, (...)

Next...

White Papers

Monday 2 January
Aberdeen Group - Sector Insight : Stronger authentication for small and mid-sized businesses

Small and Mid-sized Businesses (SMBs) athenticate their end-users primarily with passwords, in spite of the fact that passwords are less secure, inconvenient, and in fact more expensive than stronger forms of authentication. Compared to larger (...)

Next...

Tuesday 25 October
ISACA Guide Outlines Web Application Security Vulnerabilities and Strategies

The use of web applications has soared recently, due to the significant value they can add to enterprises by providing innovative ways to interact with customers. However, so have the dangers. Along with the benefits of these capabilities come (...)

Next...

See all articles

 Flux RSS