The cyber revolution and intelligence services: the collusion of two worlds

renseignement

Whilst cyber and intelligence are two tightly-knit notions, the bridges between these two worlds need to be extended, because the massive increase in available data means that using it needs to easier. Harmonising the data, sharing and diffusing it, and making it available to services or specialists are the next issues that will need to be addressed to guarantee the quality and availability of this data. Continue reading

For military intelligence, the data revolution is only just beginning

militaire

In 2008, now ten years ago, in Georgia we were observing the first documented example of the use of “cyber” tools supporting the Russian Army’s air-land operations. The incident took place barely a year after the near-paralysis of Estonia following a cyberattack. Cyber has, since, fully entered the field of military actions by revolutionising the ways in which it can be used. Continue reading

How to Format Your Smartphone and Tablet Securely

smartphone

Formatting iPhones and iPads, as well as Android smartphones and tablets, in such a way as to make data recovery impossible is a simple and quick operation — thanks to the latest encryption tools.

When formatting the memory of a PC, a Mac, a smartphone or a tablet before selling it, the data is not completely erased. The software limits itself to making the disk “overwritable,” without proceeding with the physical removal of the data present. With the right programs, the next owner of the device could retrieve sensitive information. Continue reading

Digital carelessness? IT security is matter for the boss!

In the past two years, companies in Germany have suffered losses of €100 billion as a result of cybercrime attacks. This is the conclusion of a study by the Bitkom digital association.  Furthermore, in a brochure on cybercrime published in 2016, the Federal Criminal Police Office complained that “although companies invested more heavily in preparatory awareness-raising and training measures, a large number of the companies surveyed continue to find a high level of negligence (88 percent) and a lack of understanding of risk (77 percent) amongst their employees.” Continue reading

Cybersecurity: machine learning to be the main focus in 2018

In a landscape marked by an explosion in the number of security incidents, machine learning should be the main focal point in 2018. The promise of automated learning is of as much interest to hackers as it is to companies concerned with protecting their informational assets. The subject has even made it onto McAfee’s 2018 five most important trends in cyber security. Get the lowdown here. Continue reading

Cybersecurity: Five vulnerabilities you shouldn’t ignore

Recent news is confirming the extent to which 0-Day type security breaches and their associated protocols are naturally peaking interest. As critical as they are on a technical level, these vulnerabilities only represent around 4% of the security incidents counted over the last ten years. The main responses have, then, only really been centered on a relatively low proportion of attacks. Continue reading