Search results for: cybersecurity

Hospitals facing a different kind of infection: computer viruses

computer viruses

Hervé Debar, Télécom SudParis – Institut Mines-Télécom WannaCry was the first case of a cyberattack that had a major effect on hospitals. The increasing digitization of hospitals (like all areas of society) offers significant opportunities for reducing the cost of health care while making the care provided more effective. However, …

+

Renewal of the Cyber CNI Chair: Partners Signed at FIC 2019

cyber CNI chair

After three years of operation, the Cybersecurity of Critical Infrastructure Chair (Cyber CNI) is being renewed for three more years thanks to the commitment of its academic and industrial partners. The IMT Chair led by IMT Atlantique benefits from partnerships with Télécom ParisTech and Télécom SudParis schools and support from …

+

Stack canaries: overestimating software protection

Canaries were once used in coal mines to forewarn of impending firedamp explosions. This story has inspired a cyberdefense tool : stack canaries.

Android, Windows, Mac, Linux… All operating systems contain stack canaries — one of the most common forms of software protection. These safeguards that protect computer systems from intrusions are perceived as very effective. Yet, recent research carried out by EURECOM and the Technical University of Munich show that most stack …

+

What is the Industrial Internet of Things (IIoT)?

IIoT

Industry and civil society do not share the same expectations when it comes to connected objects. The Internet of Things (IoT) must therefore adapt to meet industrial demands. These specific adaptations have led to the emergence of a new field: IIoT, or the Industrial Internet of Things. Nicolas Montavont, a …

+

TTool offers security, safety and performance for embedded systems

Ttool

I’MTech is dedicating a series of articles to success stories from research partnerships supported by the Télécom & Société Numérique Carnot Institute (TSN), to which Télécom ParisTech belongs. By combining three areas for assisting the design of embedded systems, the TTool platform is seen as a safety net for industry. …

+

Guillaume Duc

Télécom Paris | #connectedcar #cybersecurity

+

GDPR: towards values and policies

GDPR, RGPD

On May 25th, the GDPR came into effect. This new regulation requires administrations and companies in the 27 EU countries to comply with the law on the protection of personal data. Since its creation in 2013, the IMT Research Chair Values and Policies of Personal Information (CVPIP) aims to help …

+

Cyberdefense seeks to regain control

cyberdefense

Between attackers and defenders, who is in the lead? In cybersecurity, the attackers have long been viewed as the default winners. Yet infrastructures are becoming better and better at protecting themselves. Although much remains to be done, things are not as imbalanced as they might seem, and research is providing …

+

Fraud on the line

fraud

An unsolicited call is not necessarily from an unwelcome salesman. It is sometimes a case of a fraud attempt. The telephone network is home to many attacks and most are aimed at making a profit. These little-known types of fraud are difficult to recognize and difficult to fight. This article …

+

Protecting ships against modern-day pirates

ships

Cybersecurity, long viewed as a secondary concern for naval systems, has become increasingly important in recent years. Ships can no longer be seen as isolated objects at sea, naturally protected from cyber-attacks. Yvon Kermarrec, a researcher in computer science at IMT Atlantique, leads a research chair on cybersecurity in partnership …

+