Quantcast
Channel: IT bulletin, sharing IT expertise » CYBERSECURITY
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

French Defense Procurement Agency (Direction Générale de l’Armement, DGA)...

Bull will equip all Army units from 2016 onwards with a unified information system, under a contract worth some €40 million. As part of its program to rationalize its operational information systems,...

View Article


Image may be NSFW.
Clik here to view.

Bull launches the 1st integrally secured European smartphone

With this product, Bull extends its HooxTM range of secured professional terminals. Bull is today announcing the launch of an integrally secure smartphone to coincide with the Assises de la Sécurité...

View Article


Image may be NSFW.
Clik here to view.

Bull showcases its electronic warfare and protection solutions at Milipol...

Bull, a major player in European security and defense for both civil and military purposes, will be showcasing its expertise in electronic warfare and protection on stand 5T 104 at the Milipol...

View Article

Image may be NSFW.
Clik here to view.

Bull signs two contracts in the Middle East for its Shadow range of...

At Milipol 2013 (the global homeland security exhibition), Bull, the leader in critical systems design, will announce the signing of two major contracts in the Middle East for its Shadow range of...

View Article

Image may be NSFW.
Clik here to view.

Bull rolls out its solutions CRYPT2Pay and CRYPT2Protect HSM in Brazil

At the CARTES 2013 event in Paris – where Brazil is the guest of honour – Bull, the leader in mission-critical digital systems and cyber-security, will be showcasing its CRYPT2Pay and CRYPT2Protect...

View Article


Image may be NSFW.
Clik here to view.

“Hoox, the smartphone that restores a climate of trust for its users”

At the recent Assises de la Sécurité conference, Bull launched a secure smartphone known as Hoox m2. The device, with its native security, offers the same levels of functionality as today’s mass-market...

View Article

Image may be NSFW.
Clik here to view.

Big Data: new challenges for information systems security

A Big Data solution is a true information system in itself, incorporating applications, processing components, networks, data storage… but with the unique feature that it calls on massive use of data...

View Article

Image may be NSFW.
Clik here to view.

Big Data, big risks

We’re currently experiencing a massive evolution in the way that information is accessed and used. In the past twenty years everything has changed, with the advent of the Internet, the proliferation of...

View Article


Image may be NSFW.
Clik here to view.

Detecting weak signals with Big Data

When crossing internal data segments with segments that are external to the company, new types of risks are created for which standard security management is not generally prepared. It is therefore...

View Article


Image may be NSFW.
Clik here to view.

The laws of robotics… and how to apply them

In the 1940s, the science fiction writer Isaac Asimov defined three laws of robotics. Robots are often portrayed as hostile and evil, in the tradition of Frankenstein’s monster and others. But in the...

View Article
Browsing all 10 articles
Browse latest View live