#Cybermonth all articles
Cyber attaques grâce à l’IA : comment s’assurer de la fiabilité des produits ?
Au CESTI de Toulouse, Thales teste la résistance des produits de ses clients face aux cyberattaques utilisant l’intelligence artificielle.
Les usines autonomes du futur
Comment la décentralisation, l’IA, la blockchain et les cryptomonnaies libèrent le potentiel de la révolution industrielle 4.0...
Cybersécurité des systèmes spatiaux : l’expertise de Thales pour répondre aux défis d’aujourd’hui et de demain
Communication, navigation, observation, services gouvernementaux, exploration et science… En plein développement, le secteur spatial joue un rôle croissant dans notre quotidien.
Protéger l’industrie 4.0 des cybermenaces : un enjeu majeur
Les usines, de plus en plus connectées, sont devenues une cible de choix pour les cybercriminels. Pour contrer la menace, Thales a développé des solutions et offres de services éprouvées qui s’appuient sur son expertise en cybersécurité et qui bénéficient de sa connais...
5G: enabler for the digital transformation of industry
In an opinion piece published on the LinkedIn social network, Patrice Caine outlines how 5G's ultra-high-speeds, extremely low latency and high connection densities will provide the necessary infrastructure to support large-scale development of artificial intelligence ...
The Key to Trust
Key management is an essential building block in cybersecurity. It allows secure communication between two or more devices. Certificates and keys enable the authentication of communication partners and the encrypted exchange of information between the communicating com...
Can digital enable more sustainable transport?
AI and digital technologies from Thales are making rail transport the sustainable choice.
Digital transformation in the theatre of operations
Sooner than we realize, military battles will be fought on the basis of a single unified combat network comprised of soldiers, vehicles, command posts and sensors, all of them operating in complete synergy and in near real time. Decision-taking time on the battlefield ...
How digital is driving the next stage in train autonomy
The next generation of trains will be autonomous, operating without human help, thanks to digital technologies including artificial intelligence and big data. Read on
A healthy and safe network: a matter of life and death
Personal medical information and medical devices need to be protected from hackers. Thales offers safeguards against the growing risk. Read on
Digital Transformations and Data Driving Innovation
Despite its infancy, the Internet of Things (IoT) stands poised for a boom that is anticipated to achieve a multi-trillion dollar per year economic impact by 2020. For this reason, the old adage ‘knowledge is power’ has never been truer than in today’s digitized world....
Data Theft: Closing the cyber barn door before the data horses can be stolen
Thales’ made to measure Cyberthreat Intelligence and 24/7 monitoring can stop cyberattacks before they can do damage. Read more.
‘Cybersecuring’ Rail’s Digital Transformation
Rail is going digital. Operators are improving efficiency and increasing performance of their networks. They are dramatically reducing infrastructure costs and passenger experience, all at the accelerated pace made possible by the application of digital technologies. B...
Security Operation Centre
Ensure your protection from cyber attacks with our Security Operations Centres.
Cyber Threat Intelligence
Cyber Threat Intelligence makes it possible to understand and constantly analyse the cyber attack threat level, and thereby enable the confidence ecosystem to adapt its line of defence. With Cyber Threat Intelligence, qualify your incidents faster.
...
Trusted Probe
CYBELS Sensor is a cyberattack detection system for deployment in critical areas of information systems. CYBELS Sensor identifies attacks based on detection rules and behavioral analysis algorithms developed by Thales research laboratories.
...
Cybersecurity Consulting and Evaluation
In the face of a malicious cyberattack, manage the security of your Information Systems with help from our experts