Search Results for: digital security

Passwords: security, vulnerability and constraints

passwords

Hervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay What is a password? A password is a secret linked to an identity. It associates two elements, what we own (a bank card, badge, telephone, fingerprint) and what we know (password or code). Passwords are very widely used, for computers, telephones, banking. The simplest form is the numerical code (PIN), with …

Read More »

Trust and identity in the digital world

Trust, Armen Khatchatourov

This article is part of our series on trust, published on the occasion of the release of the Fondation Mines-Télécom booklet: “The new balances of trust: between algorithms and social contract.” What does “trust” mean today? Technology is redefining the concept of trust by placing the issue of identity transparency in the forefront. But according to Armen Khatchatourov, a philosopher with …

Read More »

Cybersecurity: new challenges to face up to

Cybersécurité, cyberattaques, Hervé Debar, Télécom SudParis, cybersecurity, cyberattacks

Computer hacking and sensitive data theft is increasing. Companies are now highly connected and must adapt their security policy to strengthen the protection of their information assets. Hervé Debar, a researcher at Télécom SudParis and expert in cybersecurity, studies the different types of cyber attacks in order to optimize their detection.   The era when IT students developed viruses and …

Read More »

The European digital union

Annales des Mines, Union numérique européenne, Réalités industrielles

This issue of Réalités Industrielles is devoted to several subjects central to European Commission’s strategy, such as the data economy, the economic and social functions of online platforms, and cybersecurity.   To build a Digital Single Market is to construct Europe’s future. Given the many crises facing Europe, it is more important than ever to project ourselves into the future …

Read More »

Digital transition: the music industry reviews its progress

music, Marc Bourreau, Télécom ParisTech

The music industry – the sector hit hardest by digitization – now seems to have completed the transformation that was initiated by digital technology. With the rise of streaming music, there has been a shift in the balance of power. Producers now look for revenue from sources other than record sales, and algorithms constitute the differentiating factor in the wide …

Read More »

The Cybersecurity of Critical Infrastructures Chair welcomes new partner Société Générale

Société Générale, Cybersecurity chair

The Institut Mines-Télécom Cybersecurity Chair, launched last year on January 25 as part of the dynamic created by the Center of Cyber Excellence, is aimed at contributing to the international development of research activities and training opportunities in an area that has become a national priority: the cybersecurity of critical infrastructures (energy networks, industrial processes, water production plants, financial systems, …

Read More »

Taking on quantum computers

cryptography

What if quantum computers, with their high computing power, were already available: what would happen? How would quantum computing transform communications and the way they are encrypted? Romain Alléaume, a researcher at Télécom Paris, talks to us about his research for the future of cryptography.   A hypothetical quantum computer with its high computing power would be like a sword …

Read More »

A third ERC grant in 3 years at EURECOM

Davide Balzarotti, Eurecom, ERC, Consolidator grant

Getting a grant from the European Research Council is not an easy task but this is what Davide Balzarotti, Professor in the Security Department, has just accomplished. He is the third EURECOM professor to obtain an ERC grant in the past 3 years.   Davide, you just got an ERC Consolidator grant, one of the most prestigious research grants in …

Read More »

Octave: trustworthy and robust voice biometric authentication

Octave : sécuriser la biométrie vocale contre l’usurpation

Surely, voice biometric authentication would be an easier alternative to the large amount of passwords that we use daily. One of the barriers to exploitation involves robustness to spoofing and challenging acoustic scenarios. In order to improve the reliability of voice biometric authentication systems, Nicholas Evans and his team at Eurecom are involved since June 2015 — and for a …

Read More »

Governments, banks, and hospitals: all victims of cyber-attacks

cybersécurité, attaques informatiques, attacks

Hervé Debar, Télécom SudParis – Institut Mines-Télécom Cyber-attacks are not a new phenomenon. The first computer worm distributed via the Internet, known as the “Morris worm” after its creator, infected 10% of the 60,000 computers connected to the Internet at the time. Published back in 1989, the novel The Cuckoo’s Egg was based on a true story of computer espionage. …

Read More »