Close
  • Français
  • English

Articles

2014/09/29Knowledge means security – but how to develop a more proactive strategy to information security?

Prior to the application of technological solutions, the security of information systems requires a precise knowledge of the threats and an evaluation of their possible impact on our systems. In recent years, the proliferation of open source intelligence (OSINT), such as CERTs, has made it necessary to dig deeper and especially with greater speed in…

Read More

2014/09/26[Publication] “What’s Next” Report Provides Insight on Advanced Evasion Techniques

Advanced evasion techniques (AETs) have developed quite a reputation in the information security sector, given their ability to disguise advanced persistent threats (APTs) and stealthily siphon out data. Although AETs have been active security threats for quite some time, several misconceptions remain. In an effort to dig deeper into how these threats are passing through…

Read More

2014/09/26Edito – Towards a coherent and comprehensive national digital strategy? [par Romain Galesne-Fontaine Directeur Analyses et Stratégies Institutionnelles de CEIS]

The summer decision strengthening the role of the DISIC with respect to the consistency and modernization of government information systems; the announcement from the Secretary of State for government reform and simplification, Thierry Mandon, in the Council of Ministers, on the strategy of the government to make digital a tool for modernising government: are we (finally?) witnessing…

Read More

2014/09/08Cybersecurity & Decision Support [by Cyril Nalpas, CEIS]

Over the last years, numerous studies have demonstrated that small- and medium-sized enterprises are the main victims of economic cybercrime[1][2]. Beyond the initial suspicion regarding the origin of such studies (it could indeed be primarily a marketing attempt to enter an almost still-untapped market), the cost to fight cybercrime is undoubtedly an issue. And although…

Read More

2014/09/08Breakfast talk : “Digital Sovereignty & Cloud Computing”

Behind Edward Snowden’s revelations -which have once again highlighted the digital sovereignty issues- lies a strategy identified and explained by Mr Olivier Iteanu: the concept of Law Intelligence, which consists in using legal systems to exert one’s domination. The United States have been very effective in using that strategy through the Patriot Act, which enabled the NSA to…

Read More

2014/09/08The Three Internets: How to Survive and Help the Two Others

In this second decade of the 21st century, the Internet -the network of networks- is reasserting its role as an economic driver for the creation, transfer and concentration of value of our societies. Faced with this ever-accelerating transformation, unparalleled in the world’s history, nations differ in how they control their destiny on computer networks, i.e. their…

Read More