“The state, that must eradicate all feelings of insecurity, even potential ones, has been caught in a spiral of exception, suspicion and oppression that may lead to a complete disappearance of liberties.” —Mireille Delmas Marty, Libertés et sûreté dans un monde dangereux, 2010 This book will examine the security/freedom duo in space and time with regards to electronic communications and …
Read More »Search Results for: digital security
Sovereignty and digital technology: controlling our own destiny
Annie Blandin-Obernesser, IMT Atlantique – Institut Mines-Télécom Facebook has an Oversight Board, a kind of “Supreme Court” that rules on content moderation disputes. Digital giants like Google are investing in the submarine telecommunications cable market. France has had to back pedal after choosing Microsoft to host the Health Data Hub. These are just a few examples demonstrating that the way …
Read More »The Alicem app: a controversial digital authentication system
Laura Draetta, Télécom Paris – Institut Mines-Télécom and Valérie Fernandez, Télécom Paris – Institut Mines-Télécom Some digital innovations, although considered to be of general interest, are met with distrust. A responsible innovation approach could anticipate and prevent such confidence issues. “Alicem” is a case in point. Alicem is a smartphone app developed by the State to offer the French people …
Read More »The IoT needs dedicated security – now
The world is more and more driven by networked computer systems. They dominate almost all aspects of our lives. These systems are connected to the Internet, resulting in a high threat potential. Marc-Oliver Pahl, chairholder of the cybersecurity chair Cyber CNI at IMT Atlantique, talks about what is at stakes when it comes to IoT security. What is the …
Read More »Digital sovereignty: can the Russian Internet cut itself off from the rest of the world?
This article was originally published in French in The Conversation, an international collaborative news website of scientific expertise, of which IMT is a partner. Article written by Benjamin Loveluck (Télécom ParisTech), Francesca Musiani (Sorbonne Université), Françoise Daucé (EHESS), and Ksenia Ermoshina (CNRS). The Internet infrastructure is based on the principle of the internationalization of equipment and data and information flows. Elements …
Read More »Digital twins in the health sector: mirage or reality?
Digital twins, which are already well established in industry, are becoming increasingly present in the health sector. There is a wide range of potential applications for both diagnosis and treatment, but the technology is mostly still in the research phase. The health sector is currently undergoing digital transition with a view to developing “4P” treatment: personalized, predictive, preventive and …
Read More »TTool offers security, safety and performance for embedded systems
I’MTech is dedicating a series of articles to success stories from research partnerships supported by the Télécom & Société Numérique Carnot Institute (TSN), to which Télécom ParisTech belongs. By combining three areas for assisting the design of embedded systems, the TTool platform is seen as a safety net for industry. The platform, which originated in the laboratories of Télécom ParisTech, …
Read More »Cybersecurity: high costs for companies
Hervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay The world of cybersecurity has changed drastically over the past 20 years. In the 1980s, information systems security was a rather confidential field with a focus on technical excellence. The notion of financial gain was more or less absent from attackers’ motivations. It was in the early 2000s that the first …
Read More »Cybersecurity: new times, new challenges
Editorial. Who am I? A white man, almost 30. I wear hoodies and hack websites belonging to prestigious organizations like the CIA from my parents’ basement. Above all, I am thick-skinned. Have you guessed? I am, of course, a stereotypical hacker! Movies and TV series continue to propagate this false and dated image. But due to changes in the internet, …
Read More »24 words for understanding cybersecurity
Starting with Algorithm and ending with Virus, this list features terms like Phishing and Firewall… As the symposium entitled “Are we entering a new era of cybersecurity?” is getting underway at IMT, here are 24 words to help you understand the concepts, technologies and systems used to protect people, materials and organizations from cyberattacks. This glossary was compiled with the …
Read More »