Tixeo Blog - Get informed to collaborate in complete cybersecurity

protocole QUIC visioconférence

3 key benefits of the QUIC protocol for secure video conferencing

The quality and security of video conferencing rely, in part, on demanding technological choices – one of the most critical being the communication...
protocoles de communication

TCP, QUIC, UDP: what are these communication protocols for videoconferencing?

To transmit real-time audio and video streams, videoconferencing solutions must carefully select their communication protocols. The objectives are...
fin de skype for business server

End of Skype for Business Server: rethink your communications strategy

Microsoft is set to end extended support for Skype for Business Server (2015 and 2019) on 14 October 2025. From that point onwards, organisations...
5 types of online meetings to protect more

5 types of online meetings to protect more

Intrusions into videoconferences expose sensitive information and can sometimes have numerous repercussions, including diplomatic ones. A recent case in point is the leak from a WebEx videoconference. Here are the main types of online meetings to prioritise securing...

read more
What is an on-premise video conferencing software?

What is an on-premise video conferencing software?

An on-premise video conferencing software enhances communication security and data control. Definition of an on-premise video conferencing An on-premise video conferencing software refers to an audio and video communication solution deployed and hosted on an...

read more
What is an out-of-band communication?

What is an out-of-band communication?

Used in critical contexts, out-of-band communications contribute to protecting exchanges and ensuring the continuity of business activities for organisations in crisis situations. Definition An out-of-band communication refers to communications made outside of the...

read more
What information is targeted by Industrial Espionage?

What information is targeted by Industrial Espionage?

Industrial espionage targets sensitive companies, in sectors like energy or technology, against a backdrop of geopolitical tensions and economic instability. Certain secret information of these organizations is particularly sought after. Industrial Espionage: the...

read more
Cyberspace: key geopolitical events in 2024

Cyberspace: key geopolitical events in 2024

The year 2024 will be marked by several significant political and geopolitical events that will have repercussions in cyberspace. What are they, and what are the cybersecurity risks? The 2024 political elections As the war in Ukraine and the Israeli-Palestinian...

read more
The Surveillance Industry or Europe’s Dangerous Paradox

The Surveillance Industry or Europe’s Dangerous Paradox

Excerpt from the Digital Violence platform (https://www.digitalviolence.or) Opinion piece by Jean-Philippe Commeignes, Commercial Director @Tixeo Europe, struck by the war in Ukraine for nearly two years, has been experiencing an intensification of the terrorist...

read more
Cybersecurity: What is a Security Certification?

Cybersecurity: What is a Security Certification?

Security certification for digital products and solutions is a hallmark of reliability. What does this certification entail, and how does it ensure a high level of cybersecurity? Definition of a Security Certification Security certification for computer solutions and...

read more
State Cyberespionage: Challenges and Key Figures (Infographic)

State Cyberespionage: Challenges and Key Figures (Infographic)

European businesses and organisations are facing an increase in state-originated cyberespionage attacks, predominantly from Russian or Chinese sources, which have escalated since the Ukrainian war. Key statistics of state cyberespionage include: In 2022, 77% of state...

read more

Follow Tixeo on social media: