Algorithmic video surveillance: issues and regulations

During the Olympic Games, France implemented advanced technology in public spaces to enhance security and ensure safety: algorithmic video surveillance. Article 10 of the JO 2024 has authorised this process until March 2025. Cameras capture footage, which is then analysed by algorithms. All behaviours are monitored, and if any unusual…

Commentaires fermés sur Algorithmic video surveillance: issues and regulations
Lire la suite à propos de l’article Passwords without headaches in 2024: is it still possible?
© neo.uqtr.ca

Passwords without headaches in 2024: is it still possible?

Our previous article explored why biometric authentication is now one of the most secure solutions for protecting our digital devices. But even this advanced technology is not infallible or self-sufficient. For optimum security, it must be combined with other forms of authentication, particularly multi-factor authentication (MFA). Of the various authentication…

4 commentaires
Lire la suite à propos de l’article Biometric authentication: the best security for your devices?
© CNIL

Biometric authentication: the best security for your devices?

Digital devices, particularly smartphones and computers, are an integral part of our daily lives and are used for both personal and professional purposes. They contain a great deal of data, some of it sensitive, which needs to be secured to guarantee its confidentiality, integrity, and availability. Because of their ubiquitous…

Commentaires fermés sur Biometric authentication: the best security for your devices?
Lire la suite à propos de l’article Le Cyberespace en Mutation : Sécurité et Confidentialité dans le Nouvel Âge du Commerce Électronique
©donnees-rgpd.fr

Le Cyberespace en Mutation : Sécurité et Confidentialité dans le Nouvel Âge du Commerce Électronique

Avec l'essor rapide d'Internet, le commerce électronique est devenu essentiel dans notre vie quotidienne. Sa popularité croissante soulève des inquiétudes quant à la sécurité et la confidentialité. Les consommateurs, tout en appréciant la facilité des achats en ligne, doivent rester vigilants face aux risques potentiels de fuites de données personnelles…

Commentaires fermés sur Le Cyberespace en Mutation : Sécurité et Confidentialité dans le Nouvel Âge du Commerce Électronique
Lire la suite à propos de l’article 3D secure authentication and fraud
https://www.aciworldwide.com/3d-secure-authentication

3D secure authentication and fraud

14In 2020, global retail e-commerce sales grew more than 25 percent. This represents the goods purchased or online services of more than two billion people. In the same way, according to ACI Worldwide, the total number of Card-Not-Present (CNP) transactions has increased by 9 percent. The CNP transactions introduced additional…

Commentaires fermés sur 3D secure authentication and fraud
Lire la suite à propos de l’article Telegram : The messaging system that is becoming more and more attractive
Image by iStock

Telegram : The messaging system that is becoming more and more attractive

Telegram is a Russian messenger created in 2013. It is promoted as the most secure one on the market in terms of the confidentiality of conversations exchanged on the platform. It attracts users with various profiles who are looking for more privacy and less censorship.

(suite…)

Commentaires fermés sur Telegram : The messaging system that is becoming more and more attractive

Les ressources techniques et humains pour un projet de donnée de transport…

Les ressources techniques et humains pour un projet de donnée de transport… la mise en place d’un projet qui consiste à un affichage sur un dispositifs matériels écran, de la position ou l’emplacement des moyens de transport (tram / Bus) en temps réel, afin de faciliter la tâche pour les…

Commentaires fermés sur Les ressources techniques et humains pour un projet de donnée de transport…