In 2020, the global cost of the cyber threat is estimated at 4 billion dollars with an annual growth of 50%. As the cyber threat becomes both endogenous and exogenous to the perimeter intranet network, perimeter protection of the "Maginot line" or "...
[rank_math_breadcrumb]
Intel Software Guard Extensions
INTRO In a context of health crisis, companies are increasingly required to work with remote employees. In order to protect themselves from cyber attacks and to protect their critical data, various solutions are possible. At Parsec, we...
Our experience with Hypothesis testing (and why do we love it so much!)
Intro At Scille, we are developing Parsec : an open-source zero-trust file sharing software (think of it as a Dropbox with full client-side encryption). The project has been in development for 4 years (5k commits on master, 12 contributors) and has been used...
European digital sovereignty, a question of political will (2)
Part 2 Benchmarks Destabilization of democracies, cyber-attacks on our societies, exploitation of sensitive personal data and, at the extreme end of the spectrum, war in cyberspace; the digital environment is in the midst of a revolution....
European digital sovereignty, a question of political will (1)
Part 1 Benchmarks Destabilization of democracies, cyber-attacks on our societies, exploitation of sensitive personal data and, at the extreme end of the spectrum, war in cyberspace; the digital environment is in the midst of a revolution....
The 5G era: understanding the challenges and anticipating the protection of sensitive data
HIGHLIGHTS Even more throughput, more power, more speed! The 5G is announced as the revolution that should improve the digital world for both businesses and individuals. Of course, many technological advances will be made in the future...
Cancellation of the Privacy Shield: how can European companies continue to exchange data safely?
BACKGROUND Since July 16, 2020, it is no longer possible to transfer data outside the EU to the US by referring to the Privacy Shield. The reason for this is that the CJEU, following the Schrems II case, has invalidated the Privacy Shield agreement, which did not offer users...
Blockchain for secure cloud storage (2)
The blockchain is nothing more than a chained list of blocks whose reliability as well as the durability of the information it contains are guaranteed by the link between these blocks. (see part 1) It is a technology that appeared in the 21st century...
Blockchain for secure cloud storage (1)
BACKGROUND Blockchain is a technology that emerged in the 21st century to decentralize bank transfers and became known thanks to the rise of cryptocurrencies, but it is primarily a technology that allows for sustainable, secure and decentralized storage...
Contributing to digital transformation and public cloud adoption in a different way
REPERIES France's sovereignty is based on its independence. Data being the new black gold, our independence starts today with digital sovereignty. How to tackle digital transformation at a reasonable price by relying on the...