QUANTUM COMPUTING

QUANTUM COMPUTING AND POST-QUANTUM ENCRYPTION BOSCH and INFINEON partners on connected vehicles As connected vehicles look more and more as “sofware surrounded by plastic and steelware”, the capability of chips dedicated to this domain to resist cyber-attacks has become crucial. And, as such vehicles will be manufactured on a larger scale as the time for […]

AI

AI New crisis in OpenAI and this one is really on a key point The two leaders of the department in charge of the cybersecurity policy for OpenAI have resigned, as a consequence the team has been suppressed. From what filters, the resignations of seasoned managers is due to big divergences on the challenges the […]

Testimony by our member RED ALERT LABS

RSA Conference: a testimony by our member RED ALERT LABS  Our member Roland Atoui, founder and CEO of Red Alert Labs, shares his experience after attending the RSA Conference in San Francisco (as some other members of the ECA as ENCLAIVE and MITIGANT). Reflecting on my experience at RSA Conference 2024, I’m thrilled to share […]

Privacy laws in the USA

Privacy laws in the USA After Kentucky, Maryland has now adopted a privacy legislation. Meanwhile, at Federal scale, the American Privacy Rights Act is on progress. It includes provisions as : the right for a person to access, control and possibly request cancellation of personal data hold by an entity customers are granted opt-out rights […]

WELCOME REDIMI 🇩🇪

WELCOME REDIMI 🇩🇪 Redimi stands at the forefront of innovation, revolutionizing the landscape of shopping malls and outlets with its unparalleled platform designed for the seamless issuance, management, and redemption of digital gift cards and coupons. As a beacon of ingenuity in the retail industry, Redimi has not only streamlined the entire process but has […]

Emerging Trends and Strategic Initiatives in Global Cybersecurity and Technology Development

Cloud Computing: Broadcom’s Price Hike and Market Reactions The European Cloud Alliance (ECA) has highlighted concerns regarding Broadcom’s recent decision to significantly raise the prices of VMware licenses, following its acquisition of the company two years ago. In response, OVH Cloud, which has an agreement with VMware, has communicated to its customers that it hopes […]

The Evolving Landscape of Cybersecurity: AI Scams, International Cyber-Activities, and the Rise in Global Cyber Attacks

Sophisticated AI Scams: A Warning from Switzerland A concerning trend in cybercrime has emerged with scammers using AI-generated videos to impersonate CEOs and authorize fraudulent financial transactions. As reported by the Swiss daily Le Temps, these AI-generated deceits showcase high levels of realism, making them incredibly difficult to detect. This novel use of AI highlights […]

Navigating the Intersection of AI, Privacy, and Regulation: Key Updates from Around the World

AI and GDPR Compliance: Guidance from France’s CNIL The French CNIL (National Commission on Informatics and Liberty), tasked with data protection, has recently issued a set of recommendations addressing the intersection of Artificial Intelligence (AI) and privacy. The guidelines focus on ensuring AI systems comply with the General Data Protection Regulation (GDPR). Key topics covered […]

Our members have attended GITEC DUBAI, and they have been noticed!

This year’s GISEC has proven to be a hotspot for groundbreaking developments and strategic alliances in cybersecurity. From innovative on-premises EDR solutions to advanced threat detection systems, the event showcased the dynamic evolution of cybersecurity technologies and the commitment of industry leaders to secure digital infrastructures against increasingly sophisticated threats. SEKOIA and CPX Forge Strategic […]

News from our members 12.5.2024

ISL ISL, our German affiliate, has established a partnership with Stormshield, a subsidiary of the Airbus Group. ISL introduces its ARP-GUARD solution which ensures that each endpoint attempting to connect to the company’s IT system is authenticated and compliant with established security standards. This solution effectively combats MAC address spoofing and poisoning. Stormshield contributes with […]