Search
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique





















Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

CYBER-SECURITY

Opinion

As the Convention on Cybercrime (“Budapest Convention”) (...)

Next...

 

Interviews

Last October, Senator Olivier Cadic (Union Centriste – (...)

Next...

 

ENISA

ENISA recently released a report on the cybersecurity (...)

Next...

 

Interviews

Senator Olivier Cadic is currently preparing a report (...)

Next...

 

ENISA

ENISA’s Threat Landscape 2016 (ETL 2016) released today (...)

Next...

 

ENISA

ENISA publishes a study on "Securing smart airports" (...)

Next...

 

ENISA

ENISA presents a study that sets the scene on (...)

Next...

 

ENISA

October 2016 is European Cyber Security Month and this (...)

Next...

 

ENISA

A recent ENISA report analyses how mandatory incident (...)

Next...

 

ENISA

ENISA Threat Landscape 2015: A consolidated overview to (...)

Next...

 

ENISA

ENISA publishes a good practice guide on vulnerability (...)

Next...

 

ENISA

The launch by the European Commission of a public (...)

Next...

 

ENISA

Following extensive, multi-annual negotiations the (...)

Next...

 

ENISA

“The challenge for policy makers is to achieve a (...)

Next...

 

ENISA

ENISA’s Executive Director, Udo Helmbrecht, gave a (...)

Next...

 

ENISA

ENISA’s Security Framework for Governmental Clouds (...)

Next...

 

ENISA

ENISA issues methodologies for the identification of (...)

Next...

 

ENISA

ENISA published the Threat Landscape and Good Practice (...)

Next...

 

ENISA

ENISA publishes a meta-framework and an online tool to (...)

Next...

 
CYBER-SECURITY

Interviews

Founded in Austria in 2013, ProLion GmbH develops (...)

Next...

 

WHITE PAPER

Shadline’s teams released the first European platform (...)

Next...

 

International News

Enterprise Ireland recently organised an event to (...)

Next...

 

International News

Headquartered in Zurich, Switzerland with a test lab in (...)

Next...

 

Opinion

The saying that there are two types of organizations, (...)

Next...

 

ENISA

The 5G ultra-fast mobile networks, which should be (...)

Next...

 

Business News

October 2017 is European Cyber Security Month and this (...)

Next...

 

ENISA

On May 2017, multiple companies and organisations (...)

Next...

 

Business News

European Commission Vice-President Ansip visited the EU (...)

Next...

 

ENISA

The use of long-range communication networks, and (...)

Next...

 

ENISA

Following the Council meeting on 8th and 9th December (...)

Next...

 

ENISA

The report provides an overview of the root causes of (...)

Next...

 

ENISA

Call for enhanced cooperation among private and public (...)

Next...

 

ENISA

In smart cities, Intelligent Public Transport (IPT) (...)

Next...

 

ENISA

The Regulation gives to national competent authorities (...)

Next...

 

ENISA

The potential impact of an outage in the information (...)

Next...

 

ENISA

The European Cyber Security Month (ECSM) is an EU (...)

Next...

 

ENISA

Limitations to a consistent regulatory framework and (...)

Next...

 

ENISA

Cyber security for the Smart Home is essential for the (...)

Next...

 

ENISA

ENISA’s Management Board adopted the Agency 2016 Work (...)

Next...

 

ENISA

ENISA releases its Annual Activity Report for 2014. The (...)

Next...

 

ENISA

ENISA’s Executive Director Udo Helmbrecht said: “Today (...)

Next...

 

ENISA

ENISA provides a single framework addressing the (...)

Next...

 

ENISA

ENISA has published a report providing guidelines on (...)

Next...

 

ENISA

ENISA’s publishes a new study - looking into the (...)

Next...

 

Cyber Security

In this new section you will find offers for CYBER (...)

Next...

 
PRIME TIME

Enhanced co-operation and disclosure of electronic evidence: 22 countries open the way by signing new Protocol to Cybercrime Convention

The Second Additional Protocol to the Convention on Cybercrime (Budapest Convention), aimed at enhancing co-operation and (...)

Next...

Cybercrime: Council of Europe to launch new legal arsenal

The additional protocol to the Convention on Cybercrime (Budapest Convention), intended to enhance co-operation and (...)

Next...

Child self-generated sexual images and videos: new Council of Europe report examines 43 states, providing guidance to governments

Addressing challenges raised by the significant increase and exploitation of child self-generated sexual images and videos is (...)

Next...

Feature

Opinion Friday 13 May
Building Trust in a Zero Trust Environment

A recent study by MITRE and DTEX revealed that despite years of industry efforts against insider threats, there isn’t enough data – or systems (...)

Next...

Special Reports Thursday 12 May
Yes, people share passwords: How can they do so safely?

While password sharing is associated with the perks such as money-saving, in reality, having the password of a friend or a family member could be (...)

Next...

Special Reports Tuesday 10 May
Ransomware Hit 59% of UAE Organizations Surveyed for Sophos’ Annual “State of Ransomware 2022”

Sophos released its annual international survey and review of real-world ransomware experiences in the State of Ransomware 2022. The report shows (...)

Next...

Opinion Monday 9 May
Managed SASE Services: Does One Size Fit All?

When we go shopping for new clothes, we often select different brands for shoes, shirts, or trousers. We rarely select a single brand for every (...)

Next...

Special Reports Wednesday 4 May
New study: The US has the second-highest cybercrime rate worldwide for the second year in a row

Cybersecurity company Surfshark conducted a study of the top 10 countries with the most cybercrime.

Next...

Special Reports Tuesday 3 May
Free cleaning apps put millions at risk of hacking, says research

Android users might want to think twice before downloading free apps to clean their mobile phones and “protect” them from viruses – because many of (...)

Next...

White Papers

Tuesday 17 December
White Paper KuppingerCole – Kleverware IAG

Identity & Access Governance is a must for every business. Unfortunately, the way it is commonly done today is inefficient and cumbersome. It is latest time to review the approaches on Identity & Access Governance and implement lean (...)

Next...

Monday 2 January
Aberdeen Group - Sector Insight : Stronger authentication for small and mid-sized businesses

Small and Mid-sized Businesses (SMBs) athenticate their end-users primarily with passwords, in spite of the fact that passwords are less secure, inconvenient, and in fact more expensive than stronger forms of authentication. Compared to larger (...)

Next...

See all articles

 Flux RSS