Trusting the data is a key prerequisite for the development for our digital societies. Technologies do exist to secure the origin, the integrity and the confidentiality of data. Now, end-to-end... Read More
Do we want difference or consistency in cybersecurity certification schemes? Should we be looking for similar “best practices” approaches (for Basic/Substantial/High) or trying different ideas that might be preferred in... Read More