New Search

If you are not happy with the results below please do another search

94 search results for: digital security

1

Security and Privacy in the Digital Era

“The state, that must eradicate all feelings of insecurity, even potential ones, has been caught in a spiral of exception, suspicion and oppression that may lead to a complete disappearance of liberties.” —Mireille Delmas Marty, Libertés et sûreté dans un monde dangereux, 2010 This book will examine the security/freedom duo in space and time with […]

2

Sovereignty and digital technology: controlling our own destiny

Annie Blandin-Obernesser, IMT Atlantique – Institut Mines-Télécom Facebook has an Oversight Board, a kind of “Supreme Court” that rules on content moderation disputes. Digital giants like Google are investing in the submarine telecommunications cable market. France has had to back pedal after choosing Microsoft to host the Health Data Hub. These are just a few […]

3

The Alicem app: a controversial digital authentication system

Laura Draetta, Télécom Paris – Institut Mines-Télécom and Valérie Fernandez, Télécom Paris – Institut Mines-Télécom [dropcap]S[/dropcap]ome digital innovations, although considered to be of general interest, are met with distrust. A responsible innovation approach could anticipate and prevent such confidence issues. “Alicem” is a case in point. Alicem is a smartphone app developed by the State […]

4

The IoT needs dedicated security – now

The world is more and more driven by networked computer systems. They dominate almost all aspects of our lives. These systems are connected to the Internet, resulting in a high threat potential. Marc-Oliver Pahl, chairholder of the cybersecurity chair Cyber CNI at IMT Atlantique, talks about what is at stakes when it comes to IoT […]

5

Digital sovereignty: can the Russian Internet cut itself off from the rest of the world?

This article was originally published in French in The Conversation, an international collaborative news website of scientific expertise, of which IMT is a partner.  Article written by Benjamin Loveluck (Télécom ParisTech), Francesca Musiani (Sorbonne Université), Françoise Daucé (EHESS), and Ksenia Ermoshina (CNRS). [divider style=”normal” top=”20″ bottom=”20″] [dropcap]T[/dropcap]he Internet infrastructure is based on the principle of the […]

6

Digital twins in the health sector: mirage or reality?

Digital twins, which are already well established in industry, are becoming increasingly present in the health sector. There is a wide range of potential applications for both diagnosis and treatment, but the technology is mostly still in the research phase.   The health sector is currently undergoing digital transition with a view to developing “4P” […]

7

TTool offers security, safety and performance for embedded systems

I’MTech is dedicating a series of articles to success stories from research partnerships supported by the Télécom & Société Numérique Carnot Institute (TSN), to which Télécom ParisTech belongs. [divider style=”normal” top=”20″ bottom=”20″] By combining three areas for assisting the design of embedded systems, the TTool platform is seen as a safety net for industry. The […]

8

Cybersecurity: high costs for companies

Hervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay [divider style=”normal” top=”20″ bottom=”20″] [dropcap]T[/dropcap]he world of cybersecurity has changed drastically over the past 20 years. In the 1980s, information systems security was a rather confidential field with a focus on technical excellence. The notion of financial gain was more or less absent from attackers’ motivations. […]

9

Cybersecurity: new times, new challenges

Editorial. Who am I? A white man, almost 30. I wear hoodies and hack websites belonging to prestigious organizations like the CIA from my parents’ basement. Above all, I am thick-skinned. Have you guessed? I am, of course, a stereotypical hacker! Movies and TV series continue to propagate this false and dated image. But due […]

10

24 words for understanding cybersecurity

Starting with Algorithm and ending with Virus, this list features terms like Phishing and Firewall… As the symposium entitled “Are we entering a new era of cybersecurity?” is getting underway at IMT, here are 24 words to help you understand the concepts, technologies and systems used to protect people, materials and organizations from cyberattacks. This […]