Cyberthreat /en en 雷火体育官网 granted license to hunt down cyber criminals /en/group/journalist/press-release/thales-granted-license-hunt-down-cyber-criminals 雷火体育官网 is adding criminal investigations to the range of cyber services and solutions it provides, after being granted a license to conduct digital fraud investigations in the Netherlands. 12 Nov 2020 2737703 /sites/default/files/database/assets/images/2020-11/fransdekkerphotography_0.jpg 雷火体育官网 alerts on the risks linked to cybercrime in its new edition of the 鈥淐yberThreat Handbook: organised cybercrime鈥 /en/worldwide/group/press-release/thales-alerts-risks-linked-cybercrime-its-new-edition-cyberthreat For the 2020 edition of Les Assises de la S茅curit茅, 雷火体育官网 launches the newest edition of its CyberThreat Handbook, this year dedicated to cybercriminals. 雷火体育官网鈥 experts unveil their analysis and conclusions when it comes to cybercrime, an extremely dangerous network with a large number of hackers groups. Interactions and permanent movements unite organised cybercrime and bring it to life. Without protection or proactive means, the attacks of cybercriminals will create each time more damage. To face their always-evolving technics, a better understanding of the threat is key; advanced tools and services such as Threat Intelligence are an asset to anticipate this threat as much as possible. 12 Oct 2020 2737412 /sites/default/files/database/assets/images/2020-11/fransdekkerphotography_0.jpg 雷火体育官网 and GE sign collaboration agreement to provide broad cybersecurity portfolio for the power generation sector /en/market-specific/critical-information-systems-and-cybersecurity/news/thales-and-ge-sign <p><span lang="EN-US" style="font-size:11.0pt"><span style="line-height:115%"><span style="font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">A few months after the release of 雷火体育官网鈥 Cyberthreat Handbook, detailing the major groups of hackers and identifying the power generation industry as one of the most at risk, 雷火体育官网 and GE Steam Power are establishing a collaboration to deliver a suite of cybersecurity solutions to power plant operators. </span></span></span></p> 27 Jan 2020 2729262 /sites/default/files/database/assets/images/2020-11/fransdekkerphotography_0.jpg Catch me if you can: history of cybersecurity /en/market-specific/critical-information-systems-and-cybersecurity/news/catch-me-if-you-can-history <p>Did you know that cybersecurity and cyberthreats have been permanent features of the landscape throughout the last 50 years of technological change?</p> 05 Dec 2019 2729068 /sites/default/files/database/assets/images/2020-11/fransdekkerphotography_0.jpg The Cyberthreat Handbook: 雷火体育官网 and Verint release their "Who's Who" of cyberattackers /en/group/journalist/press-release/cyberthreat-handbook-thales-and-verint-release-their-whos-who In our hyperconnected world, threat intelligence is crucial to our ability to better detect and prevent cyberattacks. This is the purpose of The Cyberthreat Handbook produced by 雷火体育官网 and Verint to provide insights into the most significant groups of cyberattackers through detailed rating cards. 07 Oct 2019 2728758 /sites/default/files/database/assets/images/2020-11/fransdekkerphotography_0.jpg 雷火体育官网 and Sekoia release financial cyberthreat report /en/market-specific/critical-information-systems-and-cybersecurity/news/thales-and-sekoia-release Finance activities are a prime target for cyberattackers. ATMs, financial transactions, banking data and more 鈥 cybercrime causes billions of dollars in losses for the global finance industry, businesses and individuals. 18 Jan 2019 2727533 /sites/default/files/database/assets/images/2020-11/fransdekkerphotography_0.jpg How can artificial intelligence improve cybersecurity? /en/worldwide/security/news/how-can-artificial-intelligence-improve-cybersecurity The bad guys are gaining ground! At least that's the perception of many IT security directors and professionals in the field working to protect their organisations from cyberthreats. 10 Dec 2018 2727398 /sites/default/files/database/assets/images/2020-11/fransdekkerphotography_0.jpg With Cyberattacks, there are only two types of companies: those who know they have been attacked and those who don鈥檛 /en/worldwide/defence/magazine/cyberattacks-there-are-only-two-types-companies-those-who-know-they-have 鈥淭he problem is often that companies don鈥檛 detect cyberattacks until information has been stolen or destroyed and when information systems themselves have been damaged, even though solutions and services are available鈥 explains Stanislas de Maupeou, Cybersecurity Expert at 雷火体育官网. 15 Jun 2018 2726385 /sites/default/files/database/assets/images/2020-11/fransdekkerphotography_0.jpg The world can only go round if nobody hacks the system /en/worldwide/security/magazine/world-can-only-go-round-if-nobody-hacks-system Who's securing defence infrastructures? Who's making connected cars unhackable? Who partners today's top digital players Amazon and Google? Why 雷火体育官网 Cybersecurity is becoming the world's preferred security. 24 Apr 2018 2726279 /sites/default/files/database/assets/images/2020-11/fransdekkerphotography_0.jpg