Category: Cloud & Next-Gen IT Security

AI4Cyb: how will AI improve your company’s cyber capabilities?

Will AI also revolutionize cybersecurity? Today, there's every reason to believe so! After a decade of massive investment in cybersecurity, we are a period of consolidation. Optimization is becoming the watchword: automate repetitive tasks, rationalize resources, detect ever faster and…

2025 Radar of Post Quantum Safety Solutions 

Quantum computing threatens today’s asymmetric cryptography and would render current algorithms obsolete, both RSA and ECC. As for symmetric cryptography, (AES, hash functions) doubling the key size ensures maintained security guarantees. To address the threat, the NIST has standardized three…

AI and personal data protection: new challenges requiring adaptation of tools and procedures

The massive deployment of artificial intelligence solutions, with complex operation and relying on large volumes of data in companies, poses unique risks to the protection of personal data. More than ever, it appears necessary for companies to review their tools…

Back to top