Think, decipher, anticipate

A blog at the service of public and private decision-makers facing uncertainty.
Igor Delanoë, expert en relations Russie-Moyen-Orient, explique l'impact de la chute d’Assad en 2024 et le repositionnement stratégique de la Russie en Syrie et en Afrique.
Sovereignty
Russia in the Middle East in 2024: Fall of Assad and the end of influence
After the fall of the Syrian regime, Russia is redefining its strategy in the Middle East. Military bases, the role of Turkey, Ukraine: what are the prospects?
Read the article

All our items

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Igor Delanoë, expert en relations Russie-Moyen-Orient, explique l'impact de la chute d’Assad en 2024 et le repositionnement stratégique de la Russie en Syrie et en Afrique.
Sovereignty
Russia in the Middle East in 2024: Fall of Assad and the end of influence
After the fall of the Syrian regime, Russia is redefining its strategy in the Middle East. Military bases, the role of Turkey, Ukraine: what are the prospects?
No items found.
Read the article
Illustration de la Table Ronde des Experts sur le MFA
Cybersecurity
MFA et IAM : comment renforcer la cybersécurité face au Shadow IT et à l’intelligence artificielle
Découvrez comment le MFA, la gestion des identités et les nouvelles réglementations NIS2 et DORA transforment la cybersécurité face au shadow IT et à l’IA.
No items found.
Read the article
Tech War
New economic cold war: China defies the West
China and the United States are competing in a new economic cold war. What place for Europe in the face of this geopolitical and commercial duel?
No items found.
Read the article
Illustration de la Cyber Threat Intelligence (CTI) et son rôle en entreprise
Cybersecurity
Why integrate Cyber Threat Intelligence into a business
Faced with the escalation of cyberattacks, Cyber Threat Intelligence is emerging as a strategic tool to anticipate, understand and counter threats.
No items found.
Read the article
llustration représentant un hacker ciblant des systèmes via des failles connues, comme des mots de passe faibles et le phishing, plutôt que des exploits zero-day.
Risk Management
Why Attackers Don't Need Zero-Day Exploits to Compromise Your IS
When we talk about computer attacks, the collective imagination spontaneously turns to highly technical threats. We think of zero-day exploits, complex chains of vulnerabilities, and targeted attacks of rare sophistication. However, in the vast majority of cases, that is not where the incidents start.
No items found.
Read the article
Illustration de Christian Harbulot, la guerre de l’information et de son impact stratégique
Sovereignty
Military war and information warfare
Analysis of the growing role of information warfare in the face of military conflicts. Historical feedback and contemporary issues presented.
No items found.
Read the article
Illustration représentant le concept de Shadow AI : des employés utilisant des outils d’intelligence artificielle non autorisés, tandis que des données sensibles s’échappent vers des entités externes.
AI
Shadow AI: the inevitable failure of cybersecurity policies?
Businesses increasingly want to rely on artificial intelligence (AI) to optimize their operations and remain competitive. However, a new threat is emerging: Shadow AI. Do organizations have to choose between business opportunities and a lack of data privacy? What measures should they deploy?
Emilien Pau
RISKINTEL Media journalist
Read the article
La gestion des identités et la réduction de la dette technique en cybersécurité
Risk Management
Managing Your Identities and Technical Debt: Mission Impossible?
Learn how to effectively manage digital identities and reduce technical debt in your business to strengthen cybersecurity and optimize your IT systems.
Emilien Pau
RISKINTEL Media journalist
Read the article
Une PME ciblée par une cyberattaque, symbolisant les risques financiers et opérationnels pour les petites entreprises
Risk Management
SMEs and cybersecurity: why they still underestimate the impacts of a cyberattack
In 2024, 330,000 French SMEs suffered a cyberattack. Find out why they are still underestimating the impacts and how to better protect themselves.
Emilien Pau
RISKINTEL Media journalist
Read the article
Miniature YouTube de l’émission « Table Ronde des Experts » sur la cybersécurité, abordant la spécialisation sectorielle des cyberattaques et les réponses adaptées des défenseurs.
Cybersecurity
Sectoral approach in cybersecurity: a necessity in the face of threats in critical sectors
Does cybersecurity need to take a sectoral approach? Health, finance, energy... Discover why each critical sector requires appropriate protection against targeted and opportunistic cyberattacks.
Emilien Pau
RISKINTEL Media journalist
Read the article