In an opinion piece published on the LinkedIn social network, Patrice Caine outlines how 5G's ultra-high-speeds, extremely low latency and high connection densities will provide the necessary infrastructure to support large-scale development of artificial intelligence ...
Key management is an essential building block in cybersecurity. It allows secure communication between two or more devices. Certificates and keys enable the authentication of communication partners and the encrypted exchange of information between the communicating com...
Sooner than we realize, military battles will be fought on the basis of a single unified combat network comprised of soldiers, vehicles, command posts and sensors, all of them operating in complete synergy and in near real time. Decision-taking time on the battlefield ...
The next generation of trains will be autonomous, operating without human help, thanks to digital technologies including artificial intelligence and big data. Read on
Despite its infancy, the Internet of Things (IoT) stands poised for a boom that is anticipated to achieve a multi-trillion dollar per year economic impact by 2020. For this reason, the old adage ‘knowledge is power’ has never been truer than in today’s digitized world....
Cyber Threat Intelligence makes it possible to understand and constantly analyse the cyber attack threat level, and thereby enable the confidence ecosystem to adapt its line of defence. With Cyber Threat Intelligence, qualify your incidents faster.
...
CYBELS Sensor is a cyberattack detection system for deployment in critical areas of information systems. CYBELS Sensor identifies attacks based on detection rules and behavioral analysis algorithms developed by Thales research laboratories.
...