Search Results for:

Social and solidarity economy in light of corporate reform

SSE

Mélissa Boudes, Institut Mines-Telecom Business School This article was co-authored by Quentin Renoul, entrepreneur. The draft PACTE law (Action Plan for Business Growth and Transformation), presented by President Emmanuel Macron’s government, seeks to change the way corporate stakeholders (entrepreneurs, funders, managers, workers, customers, etc.) see the company’s role in society. The goal is to rethink what companies could be—or should …

Read More »

Diatabase: France’s first diabetes database

The M4P consortium has received the go-ahead from Bpifrance to implement its project to build a clinical diabetes database called Diatabase. The consortium headed by Altran also includes French stakeholders in diabetes care, the companies OpenHealth and Ant’inno, as well as IMT and CEA List. The consortium aims to improve care, study and research for this disease that affects 3.7 …

Read More »

Superpixels for enhanced detection of breast cancer

breast cancer

Deep learning methods are increasingly used to aid medical diagnosis. At IMT Atlantique, Pierre-Henri Conze is taking part in this drive to use artificial intelligence algorithms for healthcare by focusing on breast cancer. His work combines superpixels defined on mammograms and deep neural networks to obtain better detection rates for tumor areas, thereby limiting false positives.   In France, one …

Read More »

The End of Web Neutrality: The End of the Internet?

neutrality

Hervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay At end 2017, a decision issued by the  Federal Communication Commission (FCC), the American agency responsible for regulating the American telecom sector (equivalent of the French ARCEP and the European BEREC), has changed the status of American Internet service providers. However, this change cannot take place in Europe due to the …

Read More »

Cybersecurity: new times, new challenges

cybersecurity

Editorial. Who am I? A white man, almost 30. I wear hoodies and hack websites belonging to prestigious organizations like the CIA from my parents’ basement. Above all, I am thick-skinned. Have you guessed? I am, of course, a stereotypical hacker! Movies and TV series continue to propagate this false and dated image. But due to changes in the internet, …

Read More »

Cyberdefense seeks to regain control

cyberdefense

Between attackers and defenders, who is in the lead? In cybersecurity, the attackers have long been viewed as the default winners. Yet infrastructures are becoming better and better at protecting themselves. Although much remains to be done, things are not as imbalanced as they might seem, and research is providing valid cyberdefense solutions to help ensure the security and resilience …

Read More »

Fraud on the line

fraud

An unsolicited call is not necessarily from an unwelcome salesman. It is sometimes a case of a fraud attempt. The telephone network is home to many attacks and most are aimed at making a profit. These little-known types of fraud are difficult to recognize and difficult to fight. This article is part of our series on Cybersecurity: new times, new …

Read More »

Protecting ships against modern-day pirates

ships

Cybersecurity, long viewed as a secondary concern for naval systems, has become increasingly important in recent years. Ships can no longer be seen as isolated objects at sea, naturally protected from cyber-attacks. Yvon Kermarrec, a researcher in computer science at IMT Atlantique, leads a research chair on cybersecurity in partnership with the French Naval School, Thales and Naval Group. He …

Read More »

Using hardware to defend software against cyber-attacks

cyber-attacks

Software applications are vulnerable to remote attacks via the internet or local networks and are cyber-attackers’ target of choice. While methods combining hardware and software have already been integrated into the most recent processors to prevent cyber-attacks, solutions based solely on hardware, which by definition cannot be remotely attacked, could soon help defend our computer programs. Jean-Luc Danger, a researcher …

Read More »

Hardware attacks, a lingering threat for connected objects

hardware attacks

Viruses, malware, spyware and other digital pathologies are not the only way computer systems’ vulnerabilities are exploited. Hardware attacks are not as well-known as these software attacks, but they are just as dangerous. They involve directly exploiting interaction with a system’s electronic components. These sneak attacks are particularly effective against connected objects. Jean-Max Dutertre’s team at Mines Saint-Étienne is committed …

Read More »