New Search

If you are not happy with the results below please do another search

56 search results for: Cybersecurity

31

Renewal of the Cyber CNI Chair: Partners Signed at FIC 2019

After three years of operation, the Cybersecurity of Critical Infrastructure Chair (Cyber CNI) is being renewed for three more years thanks to the commitment of its academic and industrial partners. The IMT Chair led by IMT Atlantique benefits from partnerships with Télécom ParisTech and Télécom SudParis schools and support from the Brittany region —a region […]

32

Stack canaries: overestimating software protection

Android, Windows, Mac, Linux… All operating systems contain stack canaries — one of the most common forms of software protection. These safeguards that protect computer systems from intrusions are perceived as very effective. Yet, recent research carried out by EURECOM and the Technical University of Munich show that most stack canaries contain vulnerabilities. The results […]

33

What is the Industrial Internet of Things (IIoT)?

Industry and civil society do not share the same expectations when it comes to connected objects. The Internet of Things (IoT) must therefore adapt to meet industrial demands. These specific adaptations have led to the emergence of a new field: IIoT, or the Industrial Internet of Things. Nicolas Montavont, a researcher at IMT Atlantique, describes […]

34

TTool offers security, safety and performance for embedded systems

I’MTech is dedicating a series of articles to success stories from research partnerships supported by the Télécom & Société Numérique Carnot Institute (TSN), to which Télécom ParisTech belongs. [divider style=”normal” top=”20″ bottom=”20″] By combining three areas for assisting the design of embedded systems, the TTool platform is seen as a safety net for industry. The […]

36

GDPR: towards values and policies

On May 25th, the GDPR came into effect. This new regulation requires administrations and companies in the 27 EU countries to comply with the law on the protection of personal data. Since its creation in 2013, the IMT Research Chair Values and Policies of Personal Information (CVPIP) aims to help businesses, citizens and public authorities […]

37

Cyberdefense seeks to regain control

Between attackers and defenders, who is in the lead? In cybersecurity, the attackers have long been viewed as the default winners. Yet infrastructures are becoming better and better at protecting themselves. Although much remains to be done, things are not as imbalanced as they might seem, and research is providing valid cyberdefense solutions to help […]

38

Fraud on the line

An unsolicited call is not necessarily from an unwelcome salesman. It is sometimes a case of a fraud attempt. The telephone network is home to many attacks and most are aimed at making a profit. These little-known types of fraud are difficult to recognize and difficult to fight. [divider style=”normal” top=”20″ bottom=”20″] This article is […]

39

Protecting ships against modern-day pirates

Cybersecurity, long viewed as a secondary concern for naval systems, has become increasingly important in recent years. Ships can no longer be seen as isolated objects at sea, naturally protected from cyber-attacks. Yvon Kermarrec, a researcher in computer science at IMT Atlantique, leads a research chair on cybersecurity in partnership with the French Naval School, […]

40

Using hardware to defend software against cyber-attacks

Software applications are vulnerable to remote attacks via the internet or local networks and are cyber-attackers’ target of choice. While methods combining hardware and software have already been integrated into the most recent processors to prevent cyber-attacks, solutions based solely on hardware, which by definition cannot be remotely attacked, could soon help defend our computer […]