Search results for: digital uses

GDPR: towards values and policies

GDPR, RGPD

On May 25th, the GDPR came into effect. This new regulation requires administrations and companies in the 27 EU countries to comply with the law on the protection of personal data. Since its creation in 2013, the IMT Research Chair Values and Policies of Personal Information (CVPIP) aims to help …

+

Cybersecurity: high costs for companies

cost of cyber-attacks

Hervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay The world of cybersecurity has changed drastically over the past 20 years. In the 1980s, information systems security was a rather confidential field with a focus on technical excellence. The notion of financial gain was more or less absent from attackers’ …

+

Cybersecurity: new times, new challenges

cybersecurity

Editorial. Who am I? A white man, almost 30. I wear hoodies and hack websites belonging to prestigious organizations like the CIA from my parents’ basement. Above all, I am thick-skinned. Have you guessed? I am, of course, a stereotypical hacker! Movies and TV series continue to propagate this false …

+

Protecting ships against modern-day pirates

ships

Cybersecurity, long viewed as a secondary concern for naval systems, has become increasingly important in recent years. Ships can no longer be seen as isolated objects at sea, naturally protected from cyber-attacks. Yvon Kermarrec, a researcher in computer science at IMT Atlantique, leads a research chair on cybersecurity in partnership …

+

Using hardware to defend software against cyber-attacks

cyber-attacks

Software applications are vulnerable to remote attacks via the internet or local networks and are cyber-attackers’ target of choice. While methods combining hardware and software have already been integrated into the most recent processors to prevent cyber-attacks, solutions based solely on hardware, which by definition cannot be remotely attacked, could …

+

Hardware attacks, a lingering threat for connected objects

hardware attacks

Viruses, malware, spyware and other digital pathologies are not the only way computer systems’ vulnerabilities are exploited. Hardware attacks are not as well-known as these software attacks, but they are just as dangerous. They involve directly exploiting interaction with a system’s electronic components. These sneak attacks are particularly effective against …

+

GDPR: managing consent with the blockchain?

consent, consentement

Blockchain and GDPR: two of the most-discussed keywords in the digital sector in recent months and years. At Télécom SudParis, Maryline Laurent has decided to bring the two together. Her research focuses on using the blockchain to manage consent to personal data processing.   The GDPR has come into force …

+

Artificial Intelligence hiding behind your computer screen!

Aizimov BEYABLE startup artificial intelligence

Far from the dazzle of intelligent humanoid robots and highly effective chatbots, artificial intelligence is now used in many ordinary products and services. In the software and websites consumers use on a daily basis, AI is being used to improve the use of digital technology. This new dynamic is perfectly …

+

H2sys: hydrogen in the energy mix

H2sys

I’MTech is dedicating a series of articles to success stories from research partnerships supported by the Télécom & Société Numérique Carnot institute (TSN), to which IMT and Femto Engineering belong. H2sys is helping make hydrogen an energy of the future. This spin-off company from the FCLAB and Femto-ST laboratories in …

+

Philosophy of science and technology in support of political ecology

political ecology, écologie politique, Fabrice Flipo, Télécom École de Management

Fabrice Flipo, a philosopher of science and technology and researcher at Institut Mines-Télécom Business School, has specialized in political ecology, sustainable development and social philosophy for nearly 20 years. Throughout the fundamental research that shapes his more technical teaching, he tries to produce an objective view of current political trends, …

+