News
Field insights & analysis
Publications on information system modernization, digital trust and responsible AI industrialization.
Quick filters
Choose a topic
No articles match your search.
Generative AI in the enterprise: what the 2026 threat landscape changes for technical teams
Generative AI is not only changing the threat landscape. It is also changing how teams need to think about architecture, connectors, permissions and usage governance. What technical teams actually need to frame in 2026.
Read article →Data breaches: why MFA is now the sine qua non of trust.
Breaches keep coming, credentials keep circulating. In 2026, the right question is no longer how to protect your password: it is how to design authentication so that a stolen password has no operational consequence.
Read articleOpen source and self-hosted AI models: real capabilities, real constraints
Llama, Mistral, Qwen, Gemma: open source models have considerably reduced the gap with frontier models. But 'free' does not mean no cost, and 'open source' does not mean no constraints. What you really need to know before choosing.
Read articleeIDAS 2 and the European e-wallet: what it concretely changes for your user journeys
The eIDAS 2 regulation and the European Digital Identity Wallet (EUDIW) will reshape identification and signing journeys. What CIOs need to anticipate right now.
Read articleNew AI models in late 2025: what really changes for your production systems
Claude Opus 4.5, GPT-5, Gemini Ultra 2... Late 2025 was marked by an acceleration in frontier model releases. Beyond the benchmarks, what really changes for teams operating AI in real conditions.
Read articleElectronic signature: a practical guide to choosing the right eIDAS level
SES, AES, QES: three levels of electronic signature with very different evidential values and implementation constraints. A guide for choosing without over-engineering or under-dimensioning.
Read articleTechnical due diligence: assessing the real technology risk behind an investment
An investor doesn't buy a demo. They buy a system that must hold under load, under regulatory pressure, and over time. What a technical due diligence audit must actually reveal, and why the approach matters as much as the deliverables.
Read articleTrust Condition Maintenance: why it changes everything about application maintenance
Classic application maintenance answers the question 'does it work?'. Trust Condition Maintenance answers a different question: 'can it be exploited, betrayed or silently fail?'. These are not the same thing.
Read articleAI Act: what technical teams need to anticipate right now
The European AI regulation has entered into application. For teams developing or deploying AI systems, the concrete obligations around documentation, traceability and human oversight are closer than you think.
Read articleOpen Banking 3 years after PSD2: where do real-world uses stand?
Account aggregation, payment initiation, SCA: what worked, what is still stuck, and the outlook with PSD3 and the instant payments regulation.
Read articleLLMOps: what it really means to put an AI model in production
Deploying an LLM is not like deploying a classic API. Governance, supervision, drift, rollback, cost: the reality of operating a language model in a critical information system.
Read articleLegacy System Modernization: Where to Start?
A practical guide to approaching legacy system modernization in a progressive and secure manner.
Read articleAML/KYC: What the New Directives Change for Your Onboarding
6AMLD, AMLA, PVID level 2 : the AML/KYC framework is tightening. What it means technically for identity verification in onboarding flows.
Read articleModular monolith vs microservices: why we so often choose the wrong one
Migration to microservices has become a reflex. It is often a mistake. The criteria that make a modular monolith the best answer, and the signals that indicate otherwise.
Read articleFIDO2 and Passkeys: What Production Deployment Actually Looks Like
Passkeys eliminate passwords, in theory. In practice, deploying FIDO2 in a production environment raises real questions about fallback, account recovery, and device management.
Read articleTechnical Debt: Measure It Before You Fix It
Before modernizing, you need to understand what you're modernizing. A practical guide to quantifying technical debt and defining a data-driven remediation roadmap.
Read articleREELIANT awarded EcoVadis Platinum Medal
REELIANT joins the top 1% of companies assessed by EcoVadis across all CSR criteria: environment, social, ethics, and sustainable procurement.
Read article