3 Einsatzmöglichkeiten des Notfallkommunikationssystems

Emergency communication tool: 3 critical uses.

When disaster strikes, communication is everything. Your organization’s ability to rapidly notify key individuals, direct employees in real time,...
Qu'est-ce que la cyberguerre ?

Cyberwarfare: Strategies, Threats, and Global Geopolitical Challenges

Cyberwarfare, also known as hybrid warfare, is redefining the rules and dimensions of international conflicts. Its actors and consequences are...
on-premise cloud visioconférence

On-premise or Cloud: How to Choose Your Videoconferencing Tool?

There are several ways to deploy videoconferencing within an organization. Whether it’s in the public cloud, private cloud, or an on-premise...
Cyberspace: key geopolitical events in 2024

Cyberspace: key geopolitical events in 2024

The year 2024 will be marked by several significant political and geopolitical events that will have repercussions in cyberspace. What are they, and what are the cybersecurity risks? The 2024 political elections As the war in Ukraine and the Israeli-Palestinian...

read more
The Surveillance Industry or Europe’s Dangerous Paradox

The Surveillance Industry or Europe’s Dangerous Paradox

Excerpt from the Digital Violence platform (https://www.digitalviolence.or) Opinion piece by Jean-Philippe Commeignes, Commercial Director @Tixeo Europe, struck by the war in Ukraine for nearly two years, has been experiencing an intensification of the terrorist...

read more
Cybersecurity: What is a Security Certification?

Cybersecurity: What is a Security Certification?

Security certification for digital products and solutions is a hallmark of reliability. What does this certification entail, and how does it ensure a high level of cybersecurity? Definition of a Security Certification Security certification for computer solutions and...

read more
State Cyberespionage: Challenges and Key Figures (Infographic)

State Cyberespionage: Challenges and Key Figures (Infographic)

European businesses and organisations are facing an increase in state-originated cyberespionage attacks, predominantly from Russian or Chinese sources, which have escalated since the Ukrainian war. Key statistics of state cyberespionage include: In 2022, 77% of state...

read more
How to Assess the Credibility of a Security Certification?

How to Assess the Credibility of a Security Certification?

To prove their dependability, IT solutions may acquire a security certification. This becomes a significant advantage in the IT market, especially in an era where cybersecurity is a key concern for organizations. However, how can one ensure the credibility of a...

read more
“Bossware”: what is this software that spies on employees?

“Bossware”: what is this software that spies on employees?

Bossware makes it possible to monitor an employee's activity remotely. The use of spyware is more widespread than you might think, especially since the advent of teleworking and AI. How can they be detected and what are the risks?   What is bossware? Definition and...

read more
OES and OIV: what is the impact of the NIS2 directive?

OES and OIV: what is the impact of the NIS2 directive?

With the forthcoming application of the NIS 2 Directive in Europe, essential service operator (OES) and operator of vital importance (OIV) are preparing for new obligations to strengthen their cybersecurity. A new name for essential service operator (OES) The creation...

read more

Follow Tixeo on social media: