Close
  • Français
  • English

Operational security

Introduction 2020 – X.0 security has not solved the password issue. The “LCR Policy” (for minimum Length, Complexity, and Regular Renewal), intuitive though it may be, persists despite findings that challenge it. Have we measured its effectiveness? Given the findings, what are the solutions? And most importantly, what are the behavioural factors that contribute to…

Read More

When Ray Tomlinson sent “QWERTYUIOP” over the ARPANET in July 1971, he probably did not suspect that this would be the beginning of a communication system that would be used by billions of people for more than 40 years. Today, six billion addresses exchange more than 150 million emails every minute (two out of three of which are of a dubious…

Read More

3 November 2000: adoption of the Bamako Declaration[i], Section B of which emphasises the holding of free, reliable and transparent elections in the Francophone world. 13-14 October 2012: opening of the 14th Francophonie Summit in Kinshasa, the capital of the Democratic Republic of the Congo (DRC). The Heads of State and Government of the International Organisation of La Francophonie (OIF) converged…

Read More

Interview with General (2S) Marc WATIN-AUGOUARD Cybersecurity goes hand in hand with cooperation, as per your approach: “no solution without public-private sector cooperation!” How do we plan for this collaboration? Can you illustrate this with a few examples? There is no fixed template. First and foremost, cooperation must meed a need, whether it is leading…

Read More

Industrial Control Systems (ICSs) are present in many areas to ensure the productivity and reliability of production systems. However, as security requirements were not taken into account in their design, these systems are extremely vulnerable to cyberattacks. Since the beginning of the 21st century, these systems have become the target of hackers, whose most famous…

Read More