Think, decipher, anticipate
A blog at the service of public and private decision-makers facing uncertainty.

Sovereignty
Russia in the Middle East in 2024: Fall of Assad and the end of influence
After the fall of the Syrian regime, Russia is redefining its strategy in the Middle East. Military bases, the role of Turkey, Ukraine: what are the prospects?
Read the article

All our items
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Sovereignty
Russia in the Middle East in 2024: Fall of Assad and the end of influence
After the fall of the Syrian regime, Russia is redefining its strategy in the Middle East. Military bases, the role of Turkey, Ukraine: what are the prospects?
No items found.
Read the article


Cybersecurity
MFA et IAM : comment renforcer la cybersécurité face au Shadow IT et à l’intelligence artificielle
Découvrez comment le MFA, la gestion des identités et les nouvelles réglementations NIS2 et DORA transforment la cybersécurité face au shadow IT et à l’IA.
No items found.
Read the article


Tech War
New economic cold war: China defies the West
China and the United States are competing in a new economic cold war. What place for Europe in the face of this geopolitical and commercial duel?
No items found.
Read the article


Cybersecurity
Why integrate Cyber Threat Intelligence into a business
Faced with the escalation of cyberattacks, Cyber Threat Intelligence is emerging as a strategic tool to anticipate, understand and counter threats.
No items found.
Read the article


Risk Management
Why Attackers Don't Need Zero-Day Exploits to Compromise Your IS
When we talk about computer attacks, the collective imagination spontaneously turns to highly technical threats. We think of zero-day exploits, complex chains of vulnerabilities, and targeted attacks of rare sophistication. However, in the vast majority of cases, that is not where the incidents start.
No items found.
Read the article


Sovereignty
Military war and information warfare
Analysis of the growing role of information warfare in the face of military conflicts. Historical feedback and contemporary issues presented.
No items found.
Read the article


AI
Shadow AI: the inevitable failure of cybersecurity policies?
Businesses increasingly want to rely on artificial intelligence (AI) to optimize their operations and remain competitive. However, a new threat is emerging: Shadow AI. Do organizations have to choose between business opportunities and a lack of data privacy? What measures should they deploy?

Emilien Pau
RISKINTEL Media journalist
Read the article


Risk Management
Managing Your Identities and Technical Debt: Mission Impossible?
Learn how to effectively manage digital identities and reduce technical debt in your business to strengthen cybersecurity and optimize your IT systems.

Emilien Pau
RISKINTEL Media journalist
Read the article


Risk Management
SMEs and cybersecurity: why they still underestimate the impacts of a cyberattack
In 2024, 330,000 French SMEs suffered a cyberattack. Find out why they are still underestimating the impacts and how to better protect themselves.

Emilien Pau
RISKINTEL Media journalist
Read the article


Cybersecurity
Sectoral approach in cybersecurity: a necessity in the face of threats in critical sectors
Does cybersecurity need to take a sectoral approach? Health, finance, energy... Discover why each critical sector requires appropriate protection against targeted and opportunistic cyberattacks.

Emilien Pau
RISKINTEL Media journalist
Read the article
