cyberespace 2024

Cyberspace: key geopolitical events in 2024

The year 2024 will be marked by several significant political and geopolitical events that will have repercussions in cyberspace. What are they, and...
protection du potentiel scientifique et technique de la nation

National Scientific and Technical Potential: How to Preserve it from Espionage?

The gathering of information related to the scientific and technological activity of a nation undermines its stability and competitiveness....
industrie de surveillance

The Surveillance Industry or Europe’s Dangerous Paradox

Excerpt from the Digital Violence platform (https://www.digitalviolence.or) Opinion piece by Jean-Philippe Commeignes, Commercial Director @Tixeo...
Cyberspace: key geopolitical events in 2024

Cyberspace: key geopolitical events in 2024

The year 2024 will be marked by several significant political and geopolitical events that will have repercussions in cyberspace. What are they, and what are the cybersecurity risks? The 2024 political elections As the war in Ukraine and the Israeli-Palestinian...

read more
The Surveillance Industry or Europe’s Dangerous Paradox

The Surveillance Industry or Europe’s Dangerous Paradox

Excerpt from the Digital Violence platform (https://www.digitalviolence.or) Opinion piece by Jean-Philippe Commeignes, Commercial Director @Tixeo Europe, struck by the war in Ukraine for nearly two years, has been experiencing an intensification of the terrorist...

read more
Cybersecurity: What is a Security Certification?

Cybersecurity: What is a Security Certification?

Security certification for digital products and solutions is a hallmark of reliability. What does this certification entail, and how does it ensure a high level of cybersecurity? Definition of a Security Certification Security certification for computer solutions and...

read more
State Cyberespionage: Challenges and Key Figures (Infographic)

State Cyberespionage: Challenges and Key Figures (Infographic)

European businesses and organisations are facing an increase in state-originated cyberespionage attacks, predominantly from Russian or Chinese sources, which have escalated since the Ukrainian war. Key statistics of state cyberespionage include: In 2022, 77% of state...

read more
How to Assess the Credibility of a Security Certification?

How to Assess the Credibility of a Security Certification?

To prove their dependability, IT solutions may acquire a security certification. This becomes a significant advantage in the IT market, especially in an era where cybersecurity is a key concern for organizations. However, how can one ensure the credibility of a...

read more
“Bossware”: what is this software that spies on employees?

“Bossware”: what is this software that spies on employees?

Bossware makes it possible to monitor an employee's activity remotely. The use of spyware is more widespread than you might think, especially since the advent of teleworking and AI. How can they be detected and what are the risks?   What is bossware? Definition and...

read more
OES and OIV: what is the impact of the NIS2 directive?

OES and OIV: what is the impact of the NIS2 directive?

With the forthcoming application of the NIS 2 Directive in Europe, essential service operator (OES) and operator of vital importance (OIV) are preparing for new obligations to strengthen their cybersecurity. A new name for essential service operator (OES) The creation...

read more

Follow Tixeo on social media: