Part 1 Benchmarks Destabilization of democracies, cyber-attacks on our societies, exploitation of sensitive personal data and, at the extreme end of the spectrum, war in cyberspace; the digital environment is in the midst of a revolution....
The 5G era: understanding the challenges and anticipating the protection of sensitive data
HIGHLIGHTS Even more throughput, more power, more speed! The 5G is announced as the revolution that should improve the digital world for both businesses and individuals. Of course, many technological advances will be made in the future...
Cancellation of the Privacy Shield: how can European companies continue to exchange data safely?
BACKGROUND Since July 16, 2020, it is no longer possible to transfer data outside the EU to the US by referring to the Privacy Shield. The reason for this is that the CJEU, following the Schrems II case, has invalidated the Privacy Shield agreement, which did not offer users...
Blockchain for secure cloud storage (2)
The blockchain is nothing more than a chained list of blocks whose reliability as well as the durability of the information it contains are guaranteed by the link between these blocks. (see part 1) It is a technology that appeared in the 21st century...
Blockchain for secure cloud storage (1)
BACKGROUND Blockchain is a technology that emerged in the 21st century to decentralize bank transfers and became known thanks to the rise of cryptocurrencies, but it is primarily a technology that allows for sustainable, secure and decentralized storage...
Contributing to digital transformation and public cloud adoption in a different way
REPERIES France's sovereignty is based on its independence. Data being the new black gold, our independence starts today with digital sovereignty. How to tackle digital transformation at a reasonable price by relying on the...
Digital security, a major challenge for national sovereignty
The "digital transformation" strategy for a company's director is based on a new vision of its information system. From the design stage, it is broken down into four strategic areas "by design": security in the cloud,...
4 Reasons why opensource is the future of data cybersecurity
Transparency, autonomy and sustainability You have the right to control the destiny of your company! As the code is open, it can be modified and adapted to the technical specificities and uses of your structure.
What digital transformation strategy for the company today?
With the General Data Protection Regulation, the company becomes legally responsible for the processing of personal data.