Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 





















Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

CYBER-SECURITY

ENISA

The Cybersecurity Certification Conference took place (...)

Next...

 

ENISA

This multilateral MoU formalises the ongoing (...)

Next...

 

ENISA

Minster of Digital Governance of the Hellenic Republic, (...)

Next...

 

ENISA

The European Union Agency for Cybersecurity (ENISA)’s (...)

Next...

 

ENISA

The exercise is part of the measures being implemented (...)

Next...

 

ENISA

The European Cybersecurity Month is coordinated by the (...)

Next...

 

Cyber Security

The European Union Agency for Cybersecurity (ENISA) (...)

Next...

 

ENISA

This report provides an overview of standards – (...)

Next...

 

ENISA

This new report maps and analyses cyber incidents in (...)

Next...

 

ENISA

33 candidates were selected ‘ad personam’, meaning on the (...)

Next...

 

ENISA

The European Union Agency for Cybersecurity (ENISA) (...)

Next...

 

International News

OECD countries today adopted the first intergovernmental

Next...

 

International News

The European Union Agency for Cybersecurity (ENISA) (...)

Next...

 

Malware Update

In its judgement of June 27 2022, the Council of State (...)

Next...

 

Opinion

As the Convention on Cybercrime (“Budapest Convention”) (...)

Next...

 

Interviews

Last October, Senator Olivier Cadic (Union Centriste – (...)

Next...

 

ENISA

ENISA recently released a report on the cybersecurity (...)

Next...

 

Interviews

Senator Olivier Cadic is currently preparing a report (...)

Next...

 

ENISA

ENISA’s Threat Landscape 2016 (ETL 2016) released today (...)

Next...

 

ENISA

ENISA publishes a study on "Securing smart airports" (...)

Next...

 

ENISA

ENISA presents a study that sets the scene on (...)

Next...

 

ENISA

October 2016 is European Cyber Security Month and this (...)

Next...

 

ENISA

A recent ENISA report analyses how mandatory incident (...)

Next...

 

ENISA

ENISA Threat Landscape 2015: A consolidated overview to (...)

Next...

 

ENISA

ENISA publishes a good practice guide on vulnerability (...)

Next...

 

ENISA

The launch by the European Commission of a public (...)

Next...

 

ENISA

Following extensive, multi-annual negotiations the (...)

Next...

 

ENISA

“The challenge for policy makers is to achieve a (...)

Next...

 

ENISA

ENISA’s Executive Director, Udo Helmbrecht, gave a (...)

Next...

 

ENISA

ENISA’s Security Framework for Governmental Clouds (...)

Next...

 

ENISA

ENISA issues methodologies for the identification of (...)

Next...

 

ENISA

ENISA published the Threat Landscape and Good Practice (...)

Next...

 

ENISA

ENISA publishes a meta-framework and an online tool to (...)

Next...

 
CYBER-SECURITY

ENISA

The report provides an evidence-based overview of the (...)

Next...

 

ENISA

In this direction, the event called on the various (...)

Next...

 

ENISA

The 7th edition of Cyber Europe, one of the largest (...)

Next...

 

Opinion

In order to speed up cross-border enforcement of the (...)

Next...

 

Special Reports

Enterprises today operate in a digitally connected (...)

Next...

 

Interviews

Our acquisition of Prevasio is official as of today. (...)

Next...

 

Interviews

At it-sa 2022, we met with Jelle Wieringa, Security (...)

Next...

 

Interviews

At it-sa 2022, we met with Klaus Hild, Principal (...)

Next...

 

ENISA

The infographic released today by the European Union (...)

Next...

 

ENISA

With the geopolitical context giving rise to (...)

Next...

 

International News

At it-sa 2022 in Nuremberg, Qualys will showcase the (...)

Next...

 

Business News

Designed to contribute to building a competent (...)

Next...

 

Malware Update

On the occasion of the World Day against Trafficking in (...)

Next...

 

Opinion

The growing digital divide between urban and rural (...)

Next...

 

Interviews

Founded in Austria in 2013, ProLion GmbH develops (...)

Next...

 

WHITE PAPER

Shadline’s teams released the first European platform (...)

Next...

 

International News

Enterprise Ireland recently organised an event to (...)

Next...

 

International News

Headquartered in Zurich, Switzerland with a test lab in (...)

Next...

 

Opinion

The saying that there are two types of organizations, (...)

Next...

 

ENISA

The 5G ultra-fast mobile networks, which should be (...)

Next...

 

Business News

October 2017 is European Cyber Security Month and this (...)

Next...

 

ENISA

On May 2017, multiple companies and organisations (...)

Next...

 

Business News

European Commission Vice-President Ansip visited the EU (...)

Next...

 

ENISA

The use of long-range communication networks, and (...)

Next...

 

ENISA

Following the Council meeting on 8th and 9th December (...)

Next...

 

ENISA

The report provides an overview of the root causes of (...)

Next...

 

ENISA

Call for enhanced cooperation among private and public (...)

Next...

 

ENISA

In smart cities, Intelligent Public Transport (IPT) (...)

Next...

 

ENISA

The Regulation gives to national competent authorities (...)

Next...

 

ENISA

The potential impact of an outage in the information (...)

Next...

 

ENISA

The European Cyber Security Month (ECSM) is an EU (...)

Next...

 

ENISA

Limitations to a consistent regulatory framework and (...)

Next...

 

ENISA

Cyber security for the Smart Home is essential for the (...)

Next...

 

ENISA

ENISA’s Management Board adopted the Agency 2016 Work (...)

Next...

 

ENISA

ENISA releases its Annual Activity Report for 2014. The (...)

Next...

 

ENISA

ENISA’s Executive Director Udo Helmbrecht said: “Today (...)

Next...

 

ENISA

ENISA provides a single framework addressing the (...)

Next...

 

ENISA

ENISA has published a report providing guidelines on (...)

Next...

 

ENISA

ENISA’s publishes a new study - looking into the (...)

Next...

 

Cyber Security

In this new section you will find offers for CYBER (...)

Next...

 
PRIME TIME

“Rematerialization: What if the key to your digital transformation is not where you expect it?”

In a world where dematerialization and digitalization are essential, rematerialization has its place. Far from being a step (...)

Next...

Mimecast Welcomes Adenike Cosgrove as Chief Marketing Officer

Mimecast announced the appointment of Adenike (Nikki) Cosgrove as Chief Marketing Officer.

Next...

Godwill N’Dulor, Senior Security Strategist, Jürgen Hentrich, Senior Sales Engineer, Fastly: Cybersecurity is very much about the technology, but it’s also about winning hearts and mind, while working as a team

From personal anecdotes to Fastly’s new DDoS Protection Service, an inspiring conversation between Jürgen Hentrich, Senior (...)

Next...

Feature

Special Reports Wednesday 26 March
New Incogni Research Finds Personal Data of 56% of Federal Judges Exposed on People Search Sites

Incogni issued a new study exposing the widespread availability of U.S. circuit court judges’ personal data on people search sites. Titled (...)

Next...

Opinion Thursday 20 March
Apple won’t build a backdoor – yet iOS apps leak secrets anyway

Apple’s UK encryption rollback has reignited the global debate on privacy. But while all eyes are on government backdoors, our latest Cybernews (...)

Next...

Malware Update Wednesday 12 March
Hacker goldmine: over 110,000 iOS apps expose hardcoded secrets, research finds

Apple’s App Store is considered the gold standard for security, but Cybernews researchers analyzed 156,080 randomly selected iOS apps – around 8% (...)

Next...

Opinion Wednesday 5 March
These Seven Facts Clarify Mobile IDs

The ongoing digitalization of personal identification demands reliable solutions for secure identification. Mobile IDs have proven to provide a (...)

Next...

Special Reports Friday 31 January
Ransomware 2024 report: the number of ransomware victims increased by 26%

According to Cybernews tool Ransomlooker’s data, nearly 5,300 ransomware victims were reported last year, a whopping 26% increase from the (...)

Next...

Special Reports Thursday 30 January
89% of IT Leaders Worry GenAI Flaws Could Negatively Impact Their Organization’s Cybersecurity Strategies, Sophos Survey Finds

Sophos released a new report, “Beyond the Hype: The Businesses Reality of AI for Cybersecurity,” which surveyed 400 IT leaders on their use of AI (...)

Next...

White Papers

Tuesday 16 April
CREST launches new guide to cyber threat intelligence

A newly published guide from CREST looks into the different types of CTI – standalone deliverables and continued threat monitoring services – and crucially, how this discipline can be used to predict, prevent, detect and respond to threats. The (...)

Next...

Tuesday 17 December
White Paper KuppingerCole – Kleverware IAG

Identity & Access Governance is a must for every business. Unfortunately, the way it is commonly done today is inefficient and cumbersome. It is latest time to review the approaches on Identity & Access Governance and implement lean (...)

Next...

See all articles

 Flux RSS






















Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts