Articles by Cert-IST
Cert-IST writes articles in which it analyzes the IT security news. These articles are first published in the monthly bulletin sent to its members. A couple of months later some of these articles are made public in this section of the website.
8 article(s) - 2014
![The attack against Sony Pictures Entertainment](/pub/images/imageDoc/imageDoc17.png)
![Report for the SSTIC 2014 conference (Part 2 of 2)](/pub/images/imageDoc/imageDoc21.png)
![Report for the SSTIC 2014 conference (Part 1 of 2)](/pub/images/imageDoc/imageDoc21.png)
![Entropy generation on Linux virtual machines](/pub/images/imageDoc/imageDoc15.png)
![Attackers’ profiles and motivations](/pub/images/imageDoc/imageDoc08.png)
![JSSI 2014 conference report](/pub/images/imageDoc/imageDoc28.png)
![Report on the security conference INSA-2014](/pub/images/imageDoc/imageDoc14.png)
![The decentralized Bitcoin currency and its security](/pub/images/imageDoc/imageDoc22.png)