Attacks on security equipment at the edge of information systems, targeted ransomware, sophisticated phishing attacks, attacks on supply chains, theft and leakage of sensitive data, exploitation of vulnerabilities in everyday tools: the cyber security landscape is...
Europe’s cybersecurity regulatory landscape is expanding at a rapid pace: the NIS2 directive for critical sectors, the DORA regulation for the financial sector, the Cyber Resilience Act (CRA) for digital products, etc. These reference texts impose new...
Against a backdrop of accelerating digitalisation and increasingly sophisticated cyber threats, the question is no longer whether an organisation will be targeted, but when and how. SMEs and SMIs in particular are on the front line when it comes to cyber attacks,...
Quantum computing, still in its infancy, already poses a credible threat to the traditional cryptographic algorithms on which information system security is based. Faced with this prospect, post-quantum cryptography (PQC) is no longer a theoretical possibility: it is...
In a context where industrial infrastructures are increasingly interconnected, managing access to control systems (SCADA, PLC, DCS, etc.) has become a key issue in operational cybersecurity. Remote access, external maintenance, network segmentation, user rights: the...