While digital transformation opens up new opportunities, it also brings with it increased risks for the systems used. Increasingly connected individuals and businesses alike can be the target of increasingly sophisticated attacks, carried out by cybercriminals who have understood the value of data and systems. A trend accentuated by the fact that critical infrastructures are driven by digital systems, raising crucial security and integrity issues for organizations, in the regulatory context of the European Union's NIS Directive. What's more, personal and sensitive data is also a major legal and societal issue, with increasingly stringent regulations, such as the RGPD in Europe.
Today, cybersecurity is more essential than ever. But with the emergence of new technologies, the ecosystem to be protected is becoming increasingly complex. The development of 5G and the Internet of Things (IoT) implies a multiplication of connected objects, and therefore of possible entry points for potential attackers. Certain applications, such as the autonomous car, also place high demands on the safety of users of these systems. Quantum computing, for its part, could well challenge current knowledge of cryptography.
In this context, the expertise of Carnot Télécom et Société numérique researchers in cybersecurity is a major added value for companies. Their work enables them to develop new, more effective encryption methods, use artificial intelligence to detect cyberattacks more quickly and accurately, and integrate security into IoT systems at every stage of their design and lifecycle.
Possible applications
- Anticipating malicious acts, using artificial intelligence to detect the first signs of an attack before it occurs.
- Improving the security of IoT systems, by integrating optimized solutions requiring the least possible computing power and data to be exchanged.
- Protecting manufacturers' critical infrastructures, by isolating them from the rest of the ecosystem and strictly monitoring information exchanges.
- Contribute to the development of innovations such as the autonomous car, by developing reliable and robust on-board safety solutions.
- Strengthen data protection on the Internet, by breaking down transmitted information into anonymized fragments.
- Ensure the confidentiality of information, by adding a hidden message (digital watermarking) to a document.
- Improving encryption methods, particularly in anticipation of the arrival of quantum computing (post-quantum cryptography).
- Facilitating the use of security mechanisms by users, by developing services that are easy to use, transparent and effective.
- Develop autonomous security, by automating the "Supervision-Analysis-Planning-Execution" loop of the security cycle, using approaches based on artificial intelligence, network virtualization and software orchestration.
- Acquiring information on threats and developing new risk analysis and management tools, within the "Cybersecurity and Risk" flagship theme.














