-
Continue reading →: How to build better trust standards to implement security by designAuthors: Roland Atoui & Isaac Dangana Introduction: Bridging the gap Everyone wants Security by Design, but few are able to make it a regular practice over time. The reasons why enterprises are unable to achieve this lofty ideal are many and varied but this article will focus on one of…
-
Continue reading →: When One Breach Cripples a Nation: Inside the Devastating Rise of Ransomware in 2024-2025Authors: Yassine El Hadi & Paul Gedeon Today, ransomware attacks are among the most damaging types of cybercrime. This threat can even lead to the downfall of organizations of a medium or large size. Malefactors take advantage of double and triple extortion by locking the data, stealing it, threatening to…
-
Continue reading →: Insights into the European Penetration Testing Ecosystem and Tool TechnologiesAuthors: Ayman Khalil & Paul Gedeon Beyond the Hoodie Cyberattacks are no longer rare, one-off events. For many organizations, they’re part of the weekly reality, something you plan for, like outages, supplier delays, or equipment failures. Because much of our economy now depends on connected systems, penetration testing has moved…
-
Continue reading →: Simpler EU digital rules and new digital wallets to save billions for businesses and boost innovationEurope’s businesses, from factories to start-ups, will spend less time on administrative work and compliance and more time innovating and scaling-up, thanks to the European Commission’s new digital package. This initiative opens opportunities for European companies to grow and to stay at the forefront of technology while at the same time promoting…
-
Continue reading →: Trusted: How a Technical Term Became the Secret Code of CybersecurityIf you’ve been in the cybersecurity industry long enough, you’ll notice a strange phenomenon: certain words quietly start showing up everywhere. You don’t remember exactly when they arrived, but suddenly they’re in every policy memo, every vendor brochure, every audit checklist. “Trusted” is one of those words.Its story is longer—and…
-
Continue reading →: BSI TR-03185-2 supports secure Free Software developmentThe German Federal Office for Information Security (BSI) has published the Technical Guideline TR-03185-2 “Secure Software Lifecycle for Open Source Software” (OSS). It was created in dialogue with the OSS community and provides simple, abstract, and practicable criteria that define a framework for the secure development of OSS. This is also calledFree / Libre and Open-Source…
-
Continue reading →: Europe’s Cyber Reality Check: Insights from ENISA’s Threat Landscape 20251. A New Kind of Cyber Era Let’s be honest: Europe’s digital ecosystem has never been more connected—or more vulnerable.ENISA’s newly released Threat Landscape 2025 (ETL 2025) report gives a sharp, evidence-driven snapshot of what’s really happening beneath that surface.Based on data from July 2024 to June 2025, the report…
-
Continue reading →: Rethinking Software Supply Chains: From XZ-Utils to Redis, Where Do the Real Risks Lie in Digital Infrastructure?For most of the industrial age, the phrase “supply chain security” brought to mind manufacturers and factories. Warehouses and the flow of physical goods were central to this image. Risk lived in the tangible: a missing part, a faulty chip, a disrupted logistics route. In that world, the supplier could…
-
Continue reading →: Navigating the EU AI Act and Data Act: Implications for France’s AI Ecosystem and EnterprisesThis 4-part series unpacks the EU AI Act and Data Act. Part 1 shows how French enterprises can meet deadlines, build trust, and stay competitive.
-
Continue reading →: European Cybersecurity Standards: NIS2, RED-DA, and CRA Harmonization ExplainedLearn how NIS2, the Radio Equipment Directive Delegated Act (RED-DA), and the Cyber Resilience Act (CRA) are shaping harmonized cybersecurity standards in Europe, and what it means for telecom and energy organizations.
