Articles


Security and Privacy by Design: A Matter of Corporate Social Responsibility for Tech Firms
JC Gaillard


IoT Security: Common Sense for Product Developers and Investors
JC Gaillard


Cybersecurity in the “When-Not-If” Era
JC Gaillard


Toward a New Model of Data Ownership
JC Gaillard


Cloud-Native Environments: A Challenge for Traditional Cybersecurity Practices
JC Gaillard