This website uses cookies. You have the possibility to accept or refuse their use.
Accept allReject allLearn more and configureWe may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, you cannot refuse them without impacting how our site functions. You can block or delete them by changing your browser settings and force blocking all cookies on this website.
These cookies collect information in a compiled manner to help us understand how our site is used and how well our marketing efforts are performing, or to help us personalize our site to improve your browsing experience.
< br>If you do not want your visit to be tracked on our site, you can block this tracking in your browser here:
We also use different external services like Google Maps and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Map Settings:
Vimeo and Youtube video embeds:
Cybersecurity: new times, new challenges
Digital, In the NewsEditorial. Who am I? A white man, almost 30. I wear hoodies and hack websites belonging to prestigious organizations like the CIA from my parents’ basement. Above all, I am thick-skinned. Have you guessed? I am, of course, a stereotypical hacker! Movies and TV series continue to propagate this false and dated image. But due […]
Cyberdefense seeks to regain control
Digital, In the NewsBetween attackers and defenders, who is in the lead? In cybersecurity, the attackers have long been viewed as the default winners. Yet infrastructures are becoming better and better at protecting themselves. Although much remains to be done, things are not as imbalanced as they might seem, and research is providing valid cyberdefense solutions to help […]
Fraud on the line
Digital, In the NewsAn unsolicited call is not necessarily from an unwelcome salesman. It is sometimes a case of a fraud attempt. The telephone network is home to many attacks and most are aimed at making a profit. These little-known types of fraud are difficult to recognize and difficult to fight. [divider style=”normal” top=”20″ bottom=”20″] This article is […]