cost of cyber-attacks

Cybersecurity: high costs for companies

,
Hervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay [divider style="normal" top="20" bottom="20"] [dropcap]T[/dropcap]he world of cybersecurity has changed drastically over the past 20 years. In the…
field hospitals, hôpitaux de campagne

Emergency logistics for field hospitals

, ,
European field hospitals, or temporary medical care stations, are standing by and ready to be deployed throughout the world in the event of a major disaster. The HOPICAMP project, of which IMT Mines Alès is one of the partners, works to improve…

Diatabase: France’s first diabetes database

, ,
The M4P consortium has received the go-ahead from Bpifrance to implement its project to build a clinical diabetes database called Diatabase. The consortium headed by Altran also includes French stakeholders in diabetes care, the companies OpenHealth…
breast cancer

Superpixels for enhanced detection of breast cancer

, ,
Deep learning methods are increasingly used to aid medical diagnosis. At IMT Atlantique, Pierre-Henri Conze is taking part in this drive to use artificial intelligence algorithms for healthcare by focusing on breast cancer. His work combines…
neutrality

The End of Web Neutrality: The End of the Internet?

,
Hervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay [divider style="normal" top="20" bottom="20"] At end 2017, a decision issued by the  Federal Communication Commission (FCC), the American agency…
cybersecurity

Cybersecurity: new times, new challenges

,
Editorial. Who am I? A white man, almost 30. I wear hoodies and hack websites belonging to prestigious organizations like the CIA from my parents’ basement. Above all, I am thick-skinned. Have you guessed? I am, of course, a stereotypical…
cyberdefense

Cyberdefense seeks to regain control

,
Between attackers and defenders, who is in the lead? In cybersecurity, the attackers have long been viewed as the default winners. Yet infrastructures are becoming better and better at protecting themselves. Although much remains to be done,…
fraud

Fraud on the line

,
An unsolicited call is not necessarily from an unwelcome salesman. It is sometimes a case of a fraud attempt. The telephone network is home to many attacks and most are aimed at making a profit. These little-known types of fraud are difficult…
ships

Protecting ships against modern-day pirates

,
Cybersecurity, long viewed as a secondary concern for naval systems, has become increasingly important in recent years. Ships can no longer be seen as isolated objects at sea, naturally protected from cyber-attacks. Yvon Kermarrec, a researcher…
cyber-attacks

Using hardware to defend software against cyber-attacks

,
Software applications are vulnerable to remote attacks via the internet or local networks and are cyber-attackers’ target of choice. While methods combining hardware and software have already been integrated into the most recent processors…