French Defense Procurement Agency (Direction Générale de l’Armement, DGA)...
Bull will equip all Army units from 2016 onwards with a unified information system, under a contract worth some €40 million. As part of its program to rationalize its operational information systems,...
View ArticleBull launches the 1st integrally secured European smartphone
With this product, Bull extends its HooxTM range of secured professional terminals. Bull is today announcing the launch of an integrally secure smartphone to coincide with the Assises de la Sécurité...
View ArticleBull showcases its electronic warfare and protection solutions at Milipol...
Bull, a major player in European security and defense for both civil and military purposes, will be showcasing its expertise in electronic warfare and protection on stand 5T 104 at the Milipol...
View ArticleBull signs two contracts in the Middle East for its Shadow range of...
At Milipol 2013 (the global homeland security exhibition), Bull, the leader in critical systems design, will announce the signing of two major contracts in the Middle East for its Shadow range of...
View ArticleBull rolls out its solutions CRYPT2Pay and CRYPT2Protect HSM in Brazil
At the CARTES 2013 event in Paris – where Brazil is the guest of honour – Bull, the leader in mission-critical digital systems and cyber-security, will be showcasing its CRYPT2Pay and CRYPT2Protect...
View Article“Hoox, the smartphone that restores a climate of trust for its users”
At the recent Assises de la Sécurité conference, Bull launched a secure smartphone known as Hoox m2. The device, with its native security, offers the same levels of functionality as today’s mass-market...
View ArticleBig Data: new challenges for information systems security
A Big Data solution is a true information system in itself, incorporating applications, processing components, networks, data storage… but with the unique feature that it calls on massive use of data...
View ArticleBig Data, big risks
We’re currently experiencing a massive evolution in the way that information is accessed and used. In the past twenty years everything has changed, with the advent of the Internet, the proliferation of...
View ArticleDetecting weak signals with Big Data
When crossing internal data segments with segments that are external to the company, new types of risks are created for which standard security management is not generally prepared. It is therefore...
View ArticleThe laws of robotics… and how to apply them
In the 1940s, the science fiction writer Isaac Asimov defined three laws of robotics. Robots are often portrayed as hostile and evil, in the tradition of Frankenstein’s monster and others. But in the...
View Article