Adil Sbai

Hi, I’m Adil Sbaï. I am currently living in Paris, France. My interests range from technology to entrepreneurship. I am also interested in marketing and programming. Feel free to say hello through any of the social links below.  

BBVA tests ‘invisible payments’ technology at inhouse cafe

More than 1,000 of the bank’s staff have already downloaded an order-ahead app for use in Ciudad BBVA and testing has begun on a biometric facial recognition system based on technology from Veridas, a joint venture startup created by the Spanish bank and Das-Nano in 2017. The order-ahead app enables users to order a coffee, Read More

Paiement en ligne frauduleux : obligations pesant sur l’utilisateur

La Cour de cassation annule la décision des juges du fond et juge ici : « Attendu que pour condamner la Caisse à payer à Mme X la somme de 3 300,28 € en remboursement de la somme prélevée sur son compte au titre du paiement litigieux et 1 € de dommages-intérêts, le jugement retient Read More

Évolution de la réglementation en matière de signature électronique

  Par un décret en date du 28 septembre 2017, le droit interne français a intégré les nouvelles exigences du droit européen relatives à la signature électronique Depuis le 1er octobre 2017, le principe est le suivant : la fiabilité d’un procédé de signature électronique est présumée, jusqu’à preuve du contraire, lorsque ce procédé met Read More

How & Why the Cybersecurity Landscape Is Changing

Cisco recently published its 2018 annual cybersecurity report. The study is far more comprehensive than previous surveys and includes threat research from its Talos group and a number of technology partners, along with a survey of 3,600 chief security officers and security operations managers from all over the world. Even more important: the report underscores the Read More

Global security trends for 2018: GDPR, identity and access security

Other key findings of the study, which polled information technologists in a broad range of industries, included the following:When asked what security methods they would implement in 2018, identity and access management was the top item, at nearly 52%, followed by network security (47%), cybersecurity (43%), cloud security (37%), encryption (34%), endpoint security (33%), multifactor Read More

PwC press room: Investors put cybersecurity top of the business threat list

Cyber attacks are the now the biggest threat to business in the eyes of investors, mirroring growing global concern from business leaders, according to a new study by PwC.In the PwC Global Investor Survey 2018 the views of investors and analysts are compared with those of business leaders.41% of investors and analysts are now extremely Read More

Comment utiliser des données chiffrées sans les déchiffrer ? c’est la magie du chiffrement homomorphe

Révolution à venir dans le «cloud»: grâce à la cryptographie homomorphe, il sera bientôt possible de manipuler des données chiffrées… sans jamais avoir à les déchiffrer. C’est pour corriger cette faiblesse que la cryptographie homomorphe a été mise au point. Celle-ci permet en effet d’effectuer des calculs sur les données chiffrées puis d’accéder au résultat Read More

The Role of Identity and Access Management in the Era of Digital Transformation

  The construction of railroads and the invention of the steam engine, which catalyzed the mechanical production, triggered the first industrial revolution from 1760 to 1840. With the advent of electricity and the assembly line, which made mass production possible, resulted in the second industrial revolution starting from the late 19th century to the early Read More

Cybersecurity’s Next Step Market Map: 80+ Companies Securing The Future With Artificial Intelligence

We used CB Insights to identify over 80 private companies in cybersecurity that are using AI and categorized them into 9 areas of operation. Cybersecurity companies saw a record number of funding deals last year and on a quarterly basis Q1’17 was the most active quarter for deals to private cybersecurity companies over the last five years. Alongside Read More

The Gartner IT Security Approach for the Digital Age

The reality of digital business means that businesses must innovate or die. But security is an integral part of the digital business equation when it comes to technologies like cloud services and big data, mobile and IT devices, rapid DevOps, and technologies such as blockchain. Security experts must adapt security techniques for the digital age.“The Read More

1 2