New Search

If you are not happy with the results below please do another search

63 search results for: Cybersecurity

11

The Cybersecurity of Critical Infrastructures Chair welcomes new partner Société Générale

The Institut Mines-Télécom Cybersecurity Chair, launched last year on January 25 as part of the dynamic created by the Center of Cyber Excellence, is aimed at contributing to the international development of research activities and training opportunities in an area that has become a national priority: the cybersecurity of critical infrastructures (energy networks, industrial processes, […]

12

High-level video surveillance for the Paris 2024 Olympic and Paralympic Games

Security methods for the Paris 2024 Olympic and Paralympic Games are relying on artificial intelligence, specifically algorithmic video surveillance. However, this technology poses a number of issues, particularly in terms of personal data protection. Claudine Guerrier, legal researcher at Institut Mines-Télécom Business School, tells us more about video surveillance using artificial intelligence.

13

The cruel dilemma of health data in the ai era: privacy or equity?

Federated learning is a way to collaboratively train artificial intelligence models. It thus represents a possible solution to AI biases, often caused by training said models on samples that lack diversity. In the healthcare sector, these biases can lead to problems of equity between patients. The EQUIHid project explores how federated learning can help develop more equitable healthcare services.

14

When hydropower goes digital

The Di-Hydro project involves digitizing hydropower plants, to operate them as sustainably as possible and better plan maintenance. IMT, in particular Télécom SudParis, is contributing to the development of a federated platform designed to facilitate secure data-exchange and decision-making, both at the level of each individual plant and collectively.

16

Side Channel Attacks: How to exploit vulnerabilities of processors?

Side channel attacks exploit confidential information obtained from microarchitecture of general purpose computers, in other terms microprocessors. Maria Mushtaq, researcher in cybersecurity at Telecom Paris, explains how these attacks work and give suggestions to improve computer security. What are the motivations that can lead to side channel attacks? Maria Mushtaq: A side-channel attack is a […]

17

Encrypting and watermarking health data to protect it

As medicine and genetics make increasing use of data science and AI, the question of how to protect this sensitive information is becoming increasingly important to all those involved in health. A team from the LaTIM laboratory is working on these issues, with solutions such as encryption and watermarking. It has just been accredited by Inserm.

18

Cryptography: what are the random numbers for?

Hervé Debar, Télécom SudParis – Institut Mines-Télécom and Olivier Levillain, Télécom SudParis – Institut Mines-Télécom The original purpose of cryptography is to allow two parties (traditionally referred to as Alice and Bob) to exchange messages without another party (traditionally known as Eve) being able to read them. Alice and Bob will therefore agree on a […]

19

Sovereignty and digital technology: controlling our own destiny

Annie Blandin-Obernesser, IMT Atlantique – Institut Mines-Télécom Facebook has an Oversight Board, a kind of “Supreme Court” that rules on content moderation disputes. Digital giants like Google are investing in the submarine telecommunications cable market. France has had to back pedal after choosing Microsoft to host the Health Data Hub. These are just a few […]

20

Governments, banks, and hospitals: all victims of cyber-attacks

Hervé Debar, Télécom SudParis – Institut Mines-Télécom Cyber-attacks are not a new phenomenon. The first computer worm distributed via the Internet, known as the “Morris worm” after its creator, infected 10% of the 60,000 computers connected to the Internet at the time. Published back in 1989, the novel The Cuckoo’s Egg was based on a […]