Cyberspace: key geopolitical events in 2024
The year 2024 will be marked by several significant political and geopolitical events that will have repercussions in cyberspace. What are they, and what are the cybersecurity risks? The 2024 political elections As the war in Ukraine and the Israeli-Palestinian...
National Scientific and Technical Potential: How to Preserve it from Espionage?
The gathering of information related to the scientific and technological activity of a nation undermines its stability and competitiveness. Discussed at the last Five Eyes summit, protecting the scientific and technical potential of nations requires maximum...
The Surveillance Industry or Europe’s Dangerous Paradox
Excerpt from the Digital Violence platform (https://www.digitalviolence.or) Opinion piece by Jean-Philippe Commeignes, Commercial Director @Tixeo Europe, struck by the war in Ukraine for nearly two years, has been experiencing an intensification of the terrorist...
Cybersecurity: What is a Security Certification?
Security certification for digital products and solutions is a hallmark of reliability. What does this certification entail, and how does it ensure a high level of cybersecurity? Definition of a Security Certification Security certification for computer solutions and...
“Bossware”: what is this software that spies on employees?
Bossware makes it possible to monitor an employee's activity remotely. The use of spyware is more widespread than you might think, especially since the advent of teleworking and AI. How can they be detected and what are the risks? What is bossware? Bossware" is...
State Cyberespionage: Challenges and Key Figures (Infographic)
European businesses and organisations are facing an increase in state-originated cyberespionage attacks, predominantly from Russian or Chinese sources, which have escalated since the Ukrainian war. Key statistics of state cyberespionage include: In 2022, 77% of state...
How to Assess the Credibility of a Security Certification?
To prove their dependability, IT solutions may acquire a security certification. This becomes a significant advantage in the IT market, especially in an era where cybersecurity is a key concern for organizations. However, how can one ensure the credibility of a...
Cyberspace: European companies faced with international cyber espionage
Cyber espionage attacks by state or para-state entities are on the increase, targeting European companies. They mainly target organisations that are essential to a country's functioning or economy. Consequences of geopolitical instabilities An upsurge in state and...
“Bossware”: what is this software that spies on employees?
Bossware makes it possible to monitor an employee's activity remotely. The use of spyware is more widespread than you might think, especially since the advent of teleworking and AI. How can they be detected and what are the risks? What is bossware? Definition and...
Finance: how to prepare for the application of DORA regulations?
Complementing the NIS2 directive, the DORA (Digital Operational Resilience Act) regulation adds another layer of cybersecurity to the financial sector. To protect their assets and the economic interests of European nations, financial institutions must strengthen their...
OES and OIV: what is the impact of the NIS2 directive?
With the forthcoming application of the NIS 2 Directive in Europe, essential service operator (OES) and operator of vital importance (OIV) are preparing for new obligations to strengthen their cybersecurity. A new name for essential service operator (OES) The creation...
The NIS2 directive: what changes for European businesses and administrations?
These European-wide cybersecurity regulations are unprecedented. There are many requirements to ensure that European organisations can demonstrate a common high level of IT security. Companies will have to comply, and quickly. Here are the main changes in the new NIS2...