Security

Scroll to see more

6G, the way for the fusion of the digital and physical worlds

6G is the name of the sixth generation of cellular networks and will provide ubiquitous...

Securing GPS data using Geo-indistinguishability

Today we can find monuments, restaurants or shops in one click, but are these technologies...

Location data: can they be really anonymous?

During the following minute thousands of applications will request millions of people to reveal their...

GRD Tech: Industry 4.0, the industrial revolution of the entire value chain

This month at GRD Tech we talk to you about Industry 4.0, the industrial revolution...

Deploying Apache Airflow with Docker Compose

Apache Airflow is an open-source tool to programmatically author, schedule and monitor workflows. It’s a...

Data anonymization: how does it protect us?

How can we guarantee that our data is really anonymous or that there is no...

5 key trends from CES 2019 to keep in mind

After five intense days and 10,600 kilometres, our team moved to the city Elvis sang...

ElevenPaths & Gradiant work together on users’ biometric verification on the encrypted domain

Both organizations have collaborated through TEGRA cybersecurity center to develop a technology for user's biometric...

Pepe’s story: 10 tips to be safe on Internet

On the occasion of the Safer Internet Day, Gradiant would like to tell you the...

Cybersecurity: data analytics to the rescue

How can data analytics be used to improve cibersecurity?
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.