New Search

If you are not happy with the results below please do another search

106 search results for: digital security

71

AI to assist the elderly

Caring and expressive artificial intelligence? This concept that seems to come straight from a man-machine romance like the movie “Her”, is in fact at the heart of a Horizon 2020 project called EMPATHIC. The project aims to develop software for a virtual and customizable coach for assisting the elderly. To learn more, we interviewed the […]

72

GDPR: towards values and policies

On May 25th, the GDPR came into effect. This new regulation requires administrations and companies in the 27 EU countries to comply with the law on the protection of personal data. Since its creation in 2013, the IMT Research Chair Values and Policies of Personal Information (CVPIP) aims to help businesses, citizens and public authorities […]

73

Protecting ships against modern-day pirates

Cybersecurity, long viewed as a secondary concern for naval systems, has become increasingly important in recent years. Ships can no longer be seen as isolated objects at sea, naturally protected from cyber-attacks. Yvon Kermarrec, a researcher in computer science at IMT Atlantique, leads a research chair on cybersecurity in partnership with the French Naval School, […]

74

Using hardware to defend software against cyber-attacks

Software applications are vulnerable to remote attacks via the internet or local networks and are cyber-attackers’ target of choice. While methods combining hardware and software have already been integrated into the most recent processors to prevent cyber-attacks, solutions based solely on hardware, which by definition cannot be remotely attacked, could soon help defend our computer […]

75

Hardware attacks, a lingering threat for connected objects

Viruses, malware, spyware and other digital pathologies are not the only way computer systems’ vulnerabilities are exploited. Hardware attacks are not as well-known as these software attacks, but they are just as dangerous. They involve directly exploiting interaction with a system’s electronic components. These sneak attacks are particularly effective against connected objects. Jean-Max Dutertre’s team […]

76

GDPR: managing consent with the blockchain?

Blockchain and GDPR: two of the most-discussed keywords in the digital sector in recent months and years. At Télécom SudParis, Maryline Laurent has decided to bring the two together. Her research focuses on using the blockchain to manage consent to personal data processing.   The GDPR has come into force at last! Six years have […]

77

New interest-free loans for startups Cyrating, Galanck, myLabel and WaryMe

On February 8, 2018, the approval committee for the Digital Fund of the Graduate Schools and Universities Initiative chose four new startups to receive loans for amounts up to €40,000 with a 0% interest rate. Cyrating, which was founded through the ParisTech Entrepreneurs incubator, Galanck and myLabel, both of which were developed through the IMT Starter (Télécom Sud Paris and Télécom […]

78

Watermarking: a step closer to secure health data

In the near future, watermarking data could be the best traceability technique in the healthcare domain. It involves hidding information into medical images with the aim at reinforcing data security for patients and healthcare professionals. After being developed for nearly ten years in the laboratories of IMT Atlantique and Medecom, watermarking has now reached a […]

79

Industry of the Future: How is the German-French Academy supporting European companies?

Opinion. By Hannemor Keidel, TUM Officer for Scientific Alliances with France, and Christian Roux, Executive Vice President for Research and Innovation at IMT. This article is the long version of the editorial published by Innovation Review.  [divider style=”normal” top=”20″ bottom=”20″] [dropcap]T[/dropcap]he German-French Academy for the Industry of the Future was founded a little over two years ago and […]

80

Is anonymized data of any value?

Anonymization is still sometimes criticized as a practice that supposedly makes data worthless, as it deletes important information. The CNIL decided to prove the contrary through the Cabanon project conducted in 2017. It received assistance from the IMT big data platform, TeraLab, for anonymizing the data of New York taxis and showing the possibility of […]