Cyberspace: key geopolitical events in 2024

Cyberspace: key geopolitical events in 2024

The year 2024 will be marked by several significant political and geopolitical events that will have repercussions in cyberspace. What are they, and what are the cybersecurity risks?

The 2024 political elections

As the war in Ukraine and the Israeli-Palestinian conflict continue towards the end of 2023, major political elections will mark the year 2024 and cyberspace.

The presidential election in Taiwan

On 13 January 2024, the presidential election in Taiwan took place. This event was under close surveillance as the candidate from the ruling party (Democratic Progressive Party), whom China strongly opposes, was favoured by a divided Taiwanese opposition. The United States was also paying close attention to the situation, at a time when tensions with the People’s Republic of China were intensifying. The opposition parties, namely the Kuomintang and the Taiwan People’s Party (TPP), were said to be “in favour of easing relations with Beijing.” The result of the election saw the ruling party’s candidate securing a decisive victory, further cementing the Democratic Progressive Party’s position in Taiwan’s political landscape.

The U.S. presidential election

On November 5, 2024, the new U.S. president will be elected. This election has significant geopolitical implications, with the likely candidacy of former President Donald Trump. Should he win, his positions regarding the war in Ukraine or his repeatedly expressed desire to leave NATO would cause global upheavals.

The european elections

In Europe, from June 6 to 9, 2024, the European elections will take place. Over 705 Members of the European Parliament will be elected to represent the citizens of the 27 EU member states. Voters are called to mobilize for this election, which could lead to a historic reorganization of political alliances within the European Parliament.

UK General Elections

On July 4, 2024, the UK general elections could see the Labour Party return to power after 14 years in opposition. A month before the election, the party led by Keir Starmer is leading the polls with around 45% of the vote, far ahead of Rishi Sunak’s Conservatives, who are polling between 20% and 25%.

The 2024 Olympic Games

The Paris 2024 Olympic Games will be held from July 26 to August 11. This sporting event is also a geopolitical event that will greatly increase the visibility of the French capital and the country as a whole. Authorities have already warned of an unprecedented increase in the level of risk of cyberattacks during the preparation and launch period of the Olympics.

Repercussions in cyberspace in 2024

These geopolitical events provide opportunities for cyber attackers to conduct large-scale operations, leading to a likely increase in the alert level for nations and organizations, especially in critical sectors.

Three main types of cyber threats

Often state-sponsored or para-state in origin, these cyber threats can be classified into three main categories.

Espionage

Cyber espionage involves stealing confidential and sensitive data, sometimes classified, from a nation or organization. This could involve intercepting information about an upcoming election to learn the outcome or harming a company’s competitive advantage. A company’s intellectual property, as well as a nation’s scientific and technical potential, can also be at stake.

Sabotage

Some cyberattacks aim to sabotage a major event, infrastructure, or a country’s critical installation. They may target computer and communication systems, networks, or databases, disrupting their proper functioning or causing irreversible damage. The goal is to harm the security and economy of a nation. Activism can also be a cause of sabotage, for example, during the Olympics, to disrupt the events of a particular country. Sabotage generally results in temporarily or permanently ending an activity and leads to severe financial losses.

Known example of sabotage: Stuxnet. Discovered in 2010, this computer worm targeted and sabotaged centrifuges used for uranium enrichment in Iran. The virus was programmed to change the machines’ speed while displaying normal data to operators, causing irreversible material damage.

Subversion

Particularly used during electoral periods, subversion aims to weaken confidence in a personality, political party, or institution to influence public opinion. Disinformation campaigns, especially on social media or via the media, are the most visible part. On a national scale, subversion leads to political instability. In companies, it can lead to governance disruptions.

Example of subversion: the Hillary Clinton email affair. In 2015, The New York Times reported that Hillary Clinton used a personal email address for official communications while she was Secretary of State of the United States. This revelation raised questions about the protection of classified information. Just days before the 2016 presidential election, the FBI announced it was reopening the investigation after discovering new emails on the computer of the husband of one of Clinton’s aides. A major controversy that may have influenced the election outcome.

Other units active in subversion include UNC1151. Linked to the Belarusian government, the group conducts online disinformation operations to discredit NATO in the Baltic states. Since 2017, the Ghostwriter campaign has been spreading fake news hostile to the Atlantic Alliance, particularly regarding the deployment of nuclear weapons.

The hack and leak phenomenon

The “hack and leak” phenomenon involves cyber attackers obtaining data, through cyber espionage, for example, and immediately leaking it online. Generally used in disinformation operations, hack and leak is a method of subversion with political consequences.

Known example of hack and leak: In France, two days before the second round of the 2017 presidential election, the “Macron Leaks” affair occurred. Documents related to Emmanuel Macron and his movement En Marche! appeared online. The campaign team confirmed that fake documents were mixed with real ones, aiming for disinformation.

Increased vigilance for nations and organizations

In summary, in 2024, economic and geopolitical uncertainty, along with major political upheavals, expose nations and organizations to significant cyber risks.

Measures to strengthen cybersecurity and cyber resilience will be crucial. The mandatory implementation of the NIS 2 regulation within EU member states by the end of the year will be beneficial. However, the time between the obligation and regulatory compliance will take time for organizations.

From now on, companies and public administrations must double their efforts to prepare for these important international events and strengthen their digital operational resilience in the face of potential crises.

Related topic: Preserving a nation’s scientific and technical potential from espionage

End of Skype for Business Server: rethink your communications strategy

End of Skype for Business Server: rethink your communications strategy

Microsoft is set to end extended support for Skype for Business Server (2015 and 2019) on 14 October 2025. From that point onwards, organisations will need to choose between migrating to a more costly, cloud-based solution or taking the opportunity to adopt a certified, European on-premise alternative.

A strategic and technological turning point

The upcoming end of support for Skype for Business Server marks a pivotal moment for companies and public sector bodies that had opted for an on-premise communications infrastructure, outside the major public cloud ecosystems.

In light of this change, customers are being steered towards Microsoft Teams – a cloud-based solution described by Microsoft as the “simplest alternative” – but one that is far from the most secure. This transition introduces both technological and legal dependency on cloud infrastructure governed by US legislation.

For those seeking to retain a Microsoft on-premise solution, the shift now presents a real strategic and operational challenge. Significant migration costs, licensing changes, and limited technical support make this option increasingly complex and difficult to sustain economically.

However, other viable alternatives do exist.

Switching tools without compromising your standards

A rapid move to Microsoft Teams might seem like the natural choice. However, this transition entails a number of risks:

  • Data hosted on US-based cloud services, subject to the Cloud Act (allowing US authorities to access user data under certain conditions),
  • Complicated access governance and auditability,
  • Unpredictable feature changes,
  • Reduced technical independence.

For organisations required to comply with regulations like NIS 2 or DORA – or those looking to bolster their digital sovereignty – migrating to Teams may raise more concerns than it resolves.

Deploying a new, on-premise communications platform that aligns with your organisation’s requirements in terms of security, sovereignty, and compliance could be the better route.

Why Stick With an On-Premise Communications Model?

Maintaining an on-premise solution addresses fundamental organisational needs – beyond just technical architecture. Key advantages include:

  • A bespoke setup tailored to your IT infrastructure and internal requirements,
  • Complete control over data, ensuring full GDPR compliance: local hosting, oversight of data flows and metadata, managed retention of content and access logs,
  • Strengthened security through system isolation – particularly valuable in sensitive or classified environments (e.g., defence, industry, energy, finance),
  • Business continuity, even without internet access or during cyber incidents,
  • Support for air-gapped and out-of-band communications, enabling secure exchanges even when offline.

Read the article: What Is an On-Premise Video Conferencing Solution?

4 key factors in choosing an alternative

When identifying a suitable replacement for Skype for Business Server, consider these essential criteria:

Secure by Design

Security must be embedded from day one. The architecture should be based on a Secure by Design approach – with no open inbound network ports, proactive vulnerability management, strong authentication, and detailed access control.

A reliable communications platform must also offer end-to-end encryption across all streams: audio, video, messaging, and file sharing.

Technological Sovereignty

The alternative should minimise reliance on foreign technology – especially solutions exposed to extraterritorial laws like the US Cloud Act – particularly for core components.

Opting for a proprietary solution developed by a European company – with R&D, ownership, capital, and support all based within Europe – significantly enhances trust and security. Independence from non-European providers ensures full control over infrastructure.

Regulatory Compliance

The platform must be fully compliant with the GDPR, both in data handling and in activity traceability. It should also support compliance with new EU regulations:

  • The NIS 2 Directive on cybersecurity for essential and important entities,
  • The DORA Regulation on digital operational resilience in the financial sector.

Deployment and Interoperability

Integration and interoperability must not be overlooked. The chosen solution should connect with existing infrastructure, support standard protocols (e.g., SIP, H.323), and offer APIs or connectors to facilitate integration into your information system.

Straightforward deployment is a major advantage, especially in complex or high-security environments.

Tixeo: a sovereign, secure, and european alternative

Tixeo is a secure video conferencing solution developed in Europe, designed to meet the highest standards of security, digital sovereignty, and regulatory compliance.

It now offers a credible and proven alternative to Skype for Business Server – especially for organisations determined to retain control over their strategic communications.

With fully proprietary technology, CSPN certification from ANSSI, and full on-premise deployment capabilities (via TixeoServer) – including in air-gapped or isolated environments – Tixeo offers:

  • Secure by Design architecture,
  • End-to-end multipoint encryption,
  • Fine-grained access control,
  • Interoperability with SIP and H.323 telephony systems,
  • Support for GDPR, NIS 2, and DORA compliance,
  • Simplified and secure on-premise deployment, with only one open port and no listening ports on workstations.

Tixeo’s on-premise model: meeting your strategic needs

Your ChallengeTixeo’s Response
End of Skype for Business ServerSmooth migration to a sovereign on-premise solution
Avoiding public or extraterritorial cloudLocal or SecNumCloud-certified private cloud hosting
Operating in sensitive or offline settingsAir gap compatibility, internet-free operation
Protecting high-stakes communicationsCSPN-certified end-to-end encryption
Ensuring GDPR / NIS 2 / DORA complianceFull support and regulatory alignment
Pursuing technological independence100% European-owned solution, with no third-party dependencies

Trusted by Governments, Defence and Critical Industries

Dassault Aviation
EDF
Naval group

Already adopted by ministries, defence agencies, financial institutions, and critical industries, Tixeo has become the strategic choice for organisations wanting to secure their most sensitive communications – without compromising on sovereignty.

Staying the course in uncertain times

Amid rising geopolitical tensions, escalating cyberthreats, and renewed focus on digital sovereignty, selecting a communications platform is no longer a technical afterthought – and “cloud-only” is no longer the only viable model.

The end of Skype for Business Server support presents a timely opportunity to rethink your communications infrastructure to:

  • Strengthen your cybersecurity posture,
  • Regain control over your data,
  • Ensure long-term digital autonomy.

For over two decades, Tixeo has embodied this vision – offering a sovereign, robust, and trusted solution.

Emergency communication tool: 3 critical uses.

Emergency communication tool: 3 critical uses.

Tixeo Blog
Tixeo Blog
Emergency communication tool: 3 critical uses.
Loading
/

When disaster strikes, communication is everything. Your organization’s ability to rapidly notify key individuals, direct employees in real time, and coordinate with emergency responders can make all the difference in minimizing damage and protecting lives. Whether through mobile alerts, mass messaging systems, or even old-school walkie-talkies, an effective emergency communication tool ensures that no message is missed and every second is maximized. In this article, we’ll explore the critical uses of this indispensable tool—from enhancing response times in crisis situations to ensuring continuity of operations during complex events. Ready to boost your organization’s preparedness? Keep reading to learn how this tool can streamline communication across multiple channels and ensure you’re prepared for whatever comes next.

What is an emergency communication tool?

In businesses, the primary communication tool serves various functions:

  • Project and operational teams use it to collaborate.
  • Partners or suppliers connect to exchange information.
  • Technical teams may share updates on the status of network infrastructures.

Additionally, employees and executives use this tool for online meetings, addressing topics of varying sensitivity. This all-encompassing tool is highly strategic in the life of an organization and may be a target for cyberattacks or subject to various malfunctions.

In such scenarios, relying on a backup communication solution is crucial. Deployed across the organization, this solution allows teams to maintain communication under all circumstances. The result is time saved, increased security, and improved efficiency while waiting for the primary tool to be restored to full functionality.

How is it deployed within an organization?

Typically, the emergency communication tool is deployed on a dedicated infrastructure within the company, separate from traditional networks, to enable out-of-band communications. In the event of a crisis, teams can benefit from secure, dedicated communication channels. This setup helps them respond to incidents and ensure business continuity and recovery more easily.

For a backup videoconferencing solution, on-premise deployment is preferred. This allows the company to maintain control over its installation and maintenance, thereby reducing external security risks. The organization can then decide whether to connect the solution to the Internet or restrict its use to internal purposes only.

In its on-premise version, Tixeo, a Secure by Design videoconferencing solution, is deployed without affecting the organization’s general network security policy.

Read the article: What is Out-of-Band Communication?

Use Case #1: Coordinating teams during a crisis

A DDoS attack has just occurred, and numerous internal services, including the primary video collaboration tool, are inaccessible. Crisis management teams, either on-site or remote, must urgently communicate through an alternative software solution to quickly coordinate and delegate tasks.


In March 2024, a major distributed denial-of-service (DDoS) attack targeted several French ministries, disrupting access to websites and messaging systems. Amid geopolitical tensions, such attacks are becoming more frequent, affecting public administrations and the banking sector.

A DDoS attack involves generating massive Internet traffic toward a target infrastructure (such as a website) via a network of infected machines (botnet). These machines send numerous simultaneous requests to the target, overwhelming the network and rendering the site or service unavailable.

Use Case #2: Ensuring business continuity

During a crisis, employees can rely on the emergency communication tool to continue exchanging information between teams, which is essential for ensuring business continuity and preparing for a return to normal operations.

For example, in a manufacturing plant, if a ransomware attack paralyzes the internal network, managers need to maintain direct contact with teams to keep production lines running. They also need to monitor the receipt of raw materials and the shipping of products with their suppliers.

In the event of a network outage that prevents access to equipment management and intervention systems, technicians must communicate via the emergency communication tool to coordinate their operations.

In the banking sector, a cyberattack may impact trading platforms, and employees must be able to communicate to make quick decisions and place orders.

Use Case #3: Internal communication during emergency situations

In the event of a cyber or other type of incident, employees may feel helpless without access to their usual collaboration tools. This is especially true for remote workers who may feel isolated without the ability to interact easily with their managers or colleagues. The emergency communication tool helps maintain real-time communication, both between teams and regarding the resolution of the incident. As a result, employees will have the same level of information and can better organize their work.

In June 2023, Rennes University Hospital suffered a cyberattack and immediately cut off the facility’s Internet connection. The hospital’s Director of Digital Services (DSN) highlighted the four factors that helped avoid data encryption. Among them, “internal and external communication” through “predefined channels” ensured that all stakeholders in the organization were informed. Rapid, organization-wide communication during the emergency helped prevent the situation from worsening (such as clicking on a compromised email or connecting to a corrupted network).

Other Uses: Training and Telework Security

The secure collaboration tool can also be used to train employees on sensitive topics or specific procedures, such as building security or activity protection. Additionally, the emergency communication solution proves valuable in preparing teams for emergency situations during crisis simulations. Regularly conducting such exercises helps strengthen cyber-resilience.

Emergency Communication Tool for NIS 2 Compliance

More than 100,000 European companies will be required to comply with the NIS 2 Directive by October 2024 to enhance their cybersecurity.

According to Article 21.2.c, the security measures implemented must allow “business continuity, such as backup management, disaster recovery, and crisis management.” Deploying an emergency communication tool is one of the levers that ensure teams remain connected during a crisis.

This recommendation aligns with Article 21.2.j, which refers to the use of “secure voice, video, and text communication solutions and emergency communication systems.” In other words, for companies subject to NIS 2, it is imperative that the deployed emergency communication tool meets strict security criteria (end-to-end encryption, secure deployment, and access).

Tixeo, a videoconferencing solution certified and qualified by the French National Agency for the Security of Information Systems (ANSSI), is designed for out-of-band communications and meets the NIS 2 requirements.

FAQ : 

How is the emergency communication tool typically deployed?

It is typically deployed on a dedicated infrastructure within the company, separate from traditional networks. This ensures out-of-band communications, which are critical during network failures or cyberattacks, allowing teams to maintain secure, uninterrupted communication  .

What is the advantage of an on-premise deployment for an emergency videoconferencing solution?

An on-premise deployment allows companies to maintain full control over their emergency communication tools. This includes installation, configuration, and deciding whether to connect to the internet. This method is particularly useful during a cyberattack or network disruption as it enables secure, out-of-band communications on dedicated servers  .

What are the primary critical uses of an emergency communication tool?

Emergency communication tools are vital for coordinating teams during a crisis, such as a DDoS attack that renders usual internal systems inoperable. They also ensure that essential alerts and instructions are delivered and received rapidly by relevant teams  .

How does the emergency communication tool help ensure business continuity?

These tools allow organizations, especially those in crisis management, to continue communicating during disruptions. They help teams coordinate specific operations, provide real-time updates, and ensure business processes are maintained even under stressful conditions  .

What role does the emergency communication tool play in internal communications during emergencies?

Emergency communication tools maintain real-time communication between teams, ensuring all staff has access to consistent and reliable information. This helps to prevent miscommunication, allowing for efficient and coordinated responses  .

What are some additional uses of an emergency communication tool?

Beyond crisis scenarios, these tools can be used for training employees on sensitive topics and conducting crisis simulation exercises. They are also useful in routine safety drills and preparing teams for potential emergencies  .

How does the emergency communication tool align with NIS 2 Directive compliance?

It complies with the NIS 2 Directive by addressing requirements for business continuity and crisis management as outlined in Article 21.2.c. It also meets the standard for secure communication solutions as stated in Article 21.2.j, ensuring compliance with European standards .

What characteristics must the emergency communication tool have to meet the requirements of NIS 2?

To meet NIS 2 standards, an emergency communication tool must include features such as end-to-end encryption, secure deployment and access, and the possibility of obtaining ANSSI certification to ensure data protection  .

What are the main challenges of communication in a crisis situation?

The main challenge is ensuring the use of secure, reliable communication tools that remain operational even when traditional networks fail. Additionally, tools must support hybrid work environments, allowing teams to assign tasks quickly and coordinate responses efficiently across multiple platforms  .

What communication tools can be used during a crisis?

Tools like secure videoconferencing, SMS, email, and satellite communication systems can be deployed on the organization’s servers to allow for continuous communication and collaboration between teams, even remotely  .