Skip to main content
Menu
Solutions
Solutions
Collaborative workspace
Cyberdefense
Data intelligence
Enriched connectivity
Customer experience
Cloud
Internet of things
Mobile connectivity
Services
All products
Industries
Industries
Automotive
Financial services
Manufacturing
Oil, gas and mining
Public sector
Retail
Smart cities
Transport and logistics
All products
About us
About us
Analysts
Corporate
Customer stories
Our local offices
Partners
Press room
Regional presence
Regional presence
Asia Pacific
Europe
Latin America
Middle-East and Africa
North America
Russia
Business Insight
Global
Global (Français)
Brazil (Português)
Latin America (Español)
Russia (Русский)
Orange Jobs
My service space
Menu
Solutions
Solutions
Collaborative workspace
Cyberdefense
Data intelligence
Enriched connectivity
Customer experience
Cloud
Internet of things
Mobile connectivity
Services
All products
Industries
Industries
Automotive
Financial services
Manufacturing
Oil, gas and mining
Public sector
Retail
Smart cities
Transport and logistics
All products
About us
About us
Analysts
Corporate
Customer stories
Our local offices
Partners
Press room
Regional presence
Regional presence
Asia Pacific
Europe
Latin America
Middle-East and Africa
North America
Russia
Business Insight
At the heart of innovation and enterprises digital transformation
See all
All thematics
Big Data
Business Continuity
Cloud
Collaboration
Connectivity
Customer Experience
Digital Transformation
IoT
Mobility
News
Security
Blogs
Customers stories
Focus
News
Reports
Webinars
See all
Security
#Blogs
Can quantum cryptography secure the Internet in the quantum computer age?
Jan Howells
Security
#Reports
IDC MarketScape: Asia/Pacific Managed Security Services Vendor Assessment – February 2020
Security
#Webinars
[Replay] COVID-19 and cybersecurity: hygiene is more important than ever, both analog and digital
Security
#Blogs
Lateral phishing, ransomware explosion and cryptojacking: the leading cyberthreats in 2019
Glenn Le Santo
Security
#Blogs
AI and ML, the next-decade antidote against cyber attacks
David Allott
Security
#Blogs
2020 cybersecurity landscape
Security
#Blogs
Banking on intelligence to combat cyber attacks
Stewart Baines
Security
#Blogs
Fake news: What could deepfakes and AI scams mean for cybersecurity?
Security
#Blogs
Banks are fighting back against cyber criminals – but the war goes on
Jan Howells
Security
#Blogs
3 common Cloud security pain points and how to overcome them
Zied Turki
Security
#Blogs
Vulnerability fatigue – why you need to get on top of patch management
Mélanie Pilpré
Security
#Blogs
Threat monitoring: pinpoint patching priority
Security
#Blogs
Why cyberdefense needs to underpin entire supply chains
Security
#Blogs
How to boost OT-IT security
Jean-Christophe Mathieu
Security
#Blogs
AI v. AI? Polymorphic malware? Formjacking? These are the new cybersecurity threats
Stewart Baines
Security
#Blogs
Fraud buster: How blockchain can clean up supply chains
Security
#News
Orange completes the acquisition of SecureLink, reinforcing its cybersecurity operations in Europe
Security
#Reports
The Forrester Wave™: Managed Security Services In Asia Pacific, Q1 2019
Security
#Blogs
Cybersecurity and the race to leverage AI
Rodrigue Le Bayon
Security
#Blogs
Threat intelligence on demand with Datalake
Aymerick Dumas
Load More