all

Cyberattack in Thessaloniki

Cyberattack in Thessaloniki Five years ago the security of the digital infrastructures of the organisations was not even an object of discussion. Most though of security as a store room with a lock on the outside, a back-up external drive, that usually remained connected on the server, and an antivirus that in most of the cases was a free one. It comes without saying that file sharing policies, back-up check in portable devices, active directory, firewall, certified connection of the users in the internet, GDPR, website access restrictions and in everything that we today consider digital security.

Continue reading

Cyberattack in Thessaloniki

Cyberattack in Thessaloniki Five years ago the security of the digital infrastructures of the organisations was not even an object of discussion. Most though of security as a store room with a lock on the outside, a back-up external drive, that usually remained connected on the server, and an antivirus that in most of the cases was a free one. It comes without saying that file sharing policies, back-up check in portable devices, active directory, firewall, certified connection of the users in the internet, GDPR, website access restrictions and in everything that we today consider digital security.

Continue reading

3 ερωτήσεις – 3 απαντήσεις: Our popular CS-AWARE podcast series of 3 questions – 3 answers now in other languages

3 questions – 3 answers: The first CS-AWARE-NEXT Podcast We start today with a podcast in Greek with Elisavet Goutman, Business Development and Marketing Manager of OTS in Greece. We are happy to announce the fourth podcast with Elisavet Goutman of OTS Greece. The reason we shall experiment with podcasts in national languages, namely not in English is rather simple: English can be our common working language for Deliverables, and can be ideal for reaching out researchers, but if we truly want to walk the last mile and increase the visibility of the project to a large audience in the participating countries, then the best is to create content in the different national languages.

Continue reading

Users are not stupid

Users are not stupid This article from Julie Haney of NIST deals with some of the misconceptions and pitfalls that cyber security professionals fall victim to. These pitfalls reflect a tendency in the cyber security community “to focus and depend on technology to solve today’s security problems while at the same time failing to appreciate the human element: the individual and social factors affecting security adoption.” To appreciate the importance of the human element in cyber security, Haney suggests it would be best to understand the concepts of usability and usable cyber security.

Continue reading

Why old school thinking?

Why old school thinking? For many years, a report from Govloop in the US writes, government agencies have applied a “hodgepodge of cyber-security strategies” to counter both internal and external risks. Many relied on firewalls to manage external activity and potential threats. In the end, the Govloop authors conclude that Legacy firewalls tend to be more concerned with activity attempting to penetrate their perimeter defenses and do not monitor internal activities within the local network.

Continue reading

Greece's new Cybersecurity Bill

Greece’s new Cybersecurity Bill A bill on cyber security, telecommunication privacy issues and personal data has been submitted to the Greek parliament. In particular, the bill aims at “ensuring the necessary balance between privacy protection and national security, within the constitutional frame and in the foundation of the best international policies.” Additionally, the bill strengthens the “citizen’s rights against the threats that are connected to the technological evolution”. The bill in question deals with issues of counter surveillance with the use of right tools, the foundation of Information Academy and counterintelligence and the setting of a stricter privacy frame.

Continue reading

CS-Connect first steps!

CS-Connect first steps! As you may remember, one of the many exciting outcomes of CS-AWARE-NEXT is the collaboration platform that has been baptized CS-Connect in the Wien meeting! CS-Connect is a collaboration layer for the ecosystem, aimed to support the organisations in their activities toward improved security. We have collected the requirements and are now deciding what is the current basis for the development and overcoming different technological challenges. We have selected several Open Collaboration Platforms (CPs) to study and evaluate.

Continue reading

A step towards DORA Compliance

A step towards DORA Compliance Most organizations, regardless of the vertical, are often engaged in complex and massive interconnections leading to some security challenges. As a result, individual and local initiatives alone may not suffice to effectively defend against current and future threats. Indeed, more synergy and collaboration amongst companies that are “shareholders in security” hence affected by the breach from others, is essential. Recent EU cybersecurity initiatives including the NIS/NIS2 and DORA for the financial sector have ought to address the cybersecurity and resilience of both, organizations delivering essential and vital services on the one hand, and the financial services, on the other.

Continue reading

The legend of The Scottish Thistle - the early version of a socio-technical defence system!

The legend of The Scottish Thistle - the early version of a socio-technical defence system! Technology is getting both advanced and effective, but what good does it do if we don’t understand and use it properly? Humans have a long history of using tools to help us make our jobs easier or for keeping us safe. However, technology can only do so much on it’s own. It needs a human touch to fulfil its full potential.

Continue reading

Supervised vs automated response to cyberthreats

Supervised vs automated response to cyberthreats Cyberthreats are continually becoming more sophisticated, thus creating a demand for an equally advanced threat detection and response. Detection of cyberthreats can very much benefit from the adoption of AI, as it is able to detect attack patterns and perform correlations among various security-related events. However, when it comes to incident handling, a fully AI-enabled approach may actually cause more harm than good, due to the critical human factors involved.

Continue reading