Close

Operational security

2020/07/15Digital Sovereignty: It is High Time to Have a Rant and Take Action!

Stéphane Volant is the president of the CDSE (Corporate Security Directors’ Club), which brings together security and safety professionals from nearly 150 of France’s largest companies. In this capacity, he sits as a user representative on the board of the CSF (Sectoral Strategic Committee) of the Security Industries. Five months! Five months have elapsed since…

Read More

2020/04/09Continuous Improvement: How do Counterproductive Routines Linger On In Security “best practices”? (by Gilles Favier))

Introduction 2020 – X.0 security has not solved the password issue. The “LCR Policy” (for minimum Length, Complexity, and Regular Renewal), intuitive though it may be, persists despite findings that challenge it. Have we measured its effectiveness? Given the findings, what are the solutions? And most importantly, what are the behavioural factors that contribute to…

Read More

2018/12/28Securing Our Communications: From Email to WhatsApp and Beyond (By Thomas Baignères and Matthieu Finiasz, OLVID)

When Ray Tomlinson sent “QWERTYUIOP” over the ARPANET in July 1971, he probably did not suspect that this would be the beginning of a communication system that would be used by billions of people for more than 40 years. Today, six billion addresses exchange more than 150 million emails every minute (two out of three of which are of a dubious…

Read More

2018/10/29Voting Machine : Challenges and opportunities in the DRC (by Chrysostome NKOUMBI-SAMBA, MBA MSDN)

3 November 2000: adoption of the Bamako Declaration[i], Section B of which emphasises the holding of free, reliable and transparent elections in the Francophone world. 13-14 October 2012: opening of the 14th Francophonie Summit in Kinshasa, the capital of the Democratic Republic of the Congo (DRC). The Heads of State and Government of the International Organisation of La Francophonie (OIF) converged…

Read More

2018/03/21CYBERSECURITY, AN ISSUE THAT MUST BE SHARED AT ALL LEVELS OF HIERARCHY

Interview with General (2S) Marc WATIN-AUGOUARD Cybersecurity goes hand in hand with cooperation, as per your approach: “no solution without public-private sector cooperation!” How do we plan for this collaboration? Can you illustrate this with a few examples? There is no fixed template. First and foremost, cooperation must meed a need, whether it is leading…

Read More

2018/03/21Cyberprotection of Industrial Control Systems: a Model-Based Approach to Detect and Respond to Cyberattacks

By Franck SICARD, Éric ZAMAÏ and Jean-Marie FLAUS Univ. Grenoble Alpes, CNRS, Grenoble INP, G-SCOP, F-38000 Grenoble, France Industrial Control Systems (ICSs) are present in many areas to ensure the productivity and reliability of production systems. However, as security requirements were not taken into account in their design, these systems are extremely vulnerable to cyberattacks….

Read More