Filter by
Capabilities
Countries

Cybersecurity in the face of the health crisis

Faced with the current health crisis, organisations must focus their efforts on regaining control over their cybersecurity and launching priority projects to meet the challenges of the coming months.


CISOs: Change your approach! Think attacker!

Faced with the challenge of streamlining operations against a backdrop of increasing threats, CISOs will need to change their approach… and one of the keys to doing so will be a shift to an attacker-centric strategy.


automative cybersecurity

Automotive Cybersecurity: Cars Under Attack

In the automotive industry, new regulations will trigger a major transformation of car manufacturer’s core activities, from car engineering to connected services, and cybersecurity will become a key requirement for future vehicle type approval.


The protection and security of ICS

Industrial Control Systems are being increasingly forced to open up to the broader market and corporate IS technologies.


intelligence artificielle cybersécurité

Artificial Intelligence and Cybersecurity: protecting tomorrow’s world today

In this article Wavestone describes the specific risks associated with AI and the security solutions which can be applied in this innovative area.


SOC

Fusion Centers: the future of SOCs

The respective roles of the SOC and CSIRT haven’t been precisely defined, and some tasks fall where their responsibilities overlap: for example, what is the SOC’s role in crisis management? Or, how can the CSIRT help in detection?


2019 UK Cybersecurity Start-Up Radar

Discover our 2019 market analysis and the latest trends for the UK’s cybersecurity start-up landscape.


Shifting regulatory landscape calls for maturity-driven approach to Data Privacy

While GDPR is the overarching privacy law in Europe, the nature of American federalism has led to as many as 15 states pushing their own privacy regulations, adding to the complexity of US companies’ compliance efforts. How do US companies comply with all the privacy regulations in an overwhelmingly complex legislative landscape?