All

Storytelling Workshops 2022

Storytelling Workshops 2022 We have organised storytelling workshops in the two pilot sites of the project: the municipalities of Larissa and Foggia. Representatives of multiple public and private organisations came together for four days for these workshops that were organised by our project. During the workshop, participants shared stories about their experiences with cybersecurity in their organisations, and, in addition, discussed real world examples of cyberattacks that had serious implications on a region, or, the term we like to use, on an entire ecosystem.

Continue reading

Cybersecurity – a case for advanced decision models

Cybersecurity – a case for advanced decision models Advanced attacks demand advanced countermeasures. On a technical level there already is an elevated level of awareness and readiness. That is why in a first wave of attacks criminals usually focus on tricking users into opening up systems for them . While this has now been the rule for at least over a decade, the way in which these attacks are prepared now follow an almost military style approach.

Continue reading

3 questions – 3 answers: Starting up for 2023 with a discussion on ‘AI, the Universe and Everything’ with two Datrix C-level executives

3 questions – 3 answers: Starting up for 2023 with a discussion on ‘AI, the Universe and Everything’ with two Datrix C-level executives We are happy to announce the third podcast with Pierluigi Vacca and Matteo Bregonzio of Datrix, Italy. Pierluigi Vacca, after a 3-year experience with Google USA as Search Quality Evaluator (analysis of search queries and site positioning to improve the Google algorithm) in 2004 he took part in the start-up of Google Italy as manager of Italian and international key accounts, connecting activities as marketing & communication strategies, data intelligence and customers acquisition/retention.

Continue reading

Data poisoning attacks

Data poisoning attacks Data poisoning is an increasingly important security concern for Machine Learning (ML) systems. As machine learning models are becoming more prevalent in our lives, they are also becoming more vulnerable to malicious attacks. Data poisoning attacks are one of the most insidious and difficult-to-detect kinds of threats on ML models. Data poisoning is a type of adversarial attack in which a cybercriminal injects malicious data into a machine learning model.

Continue reading

Massive increase in cyber attacks in 2022

Massive increase in cyber attacks in 2022 Universities, research centers, state and military services, hospitals, communication infrastructure and banks have received numerous cyberattacks in 2022; and the worst is yet to come. It is estimated that more than 1.000 cyberattacks per organisation take place throughout the universe, which is 38% more than 2021. In Europe in particular, the average number of attacks per target reached 1.000, with an increase of 26% when compared to 2021.

Continue reading

CriM -- Cyber Security Seminar and Workshops -- 2022

CriM - Engaging the next generation of cyber security professionals During November 2022 we held the Cyber Security Seminar and Workshops in Oulu, Finland. This four days event has been held since 1999 and brings together teachers, researchers, experts, and students of cybersecurity: https://www.oulu.fi/en/crim. CriM had twelve talks before lunch and three exercises in the afternoon, covering topics from incidence response to password handling. We were especially glad to hear a talk from Bart Preneel, Europe’s most pronounced cryptography expert, who reminded us at the end of his presentation to a quote from Immanuel Kant “Optimism is a moral duty”.

Continue reading

Cybersecurity For Public Utilities Solutions III

Cybersecurity For Public Utilities Solutions III Failing to understand the gravity of the potential effects of a power grid attack leaves municipal utility companies unprepared to enact the necessary cybersecurity counter-measures necessary to prevent or, at least, mitigate attacks. As Miller [1], points out, local governments could benefit from the information that would lead to the early prevention of cyberattacks. Unfortunately, the information is often hidden or never revealed. Although municipalities are obliged to report attacks in a timely fashion, they often avoid reporting attacks to maintain credibility.

Continue reading

Cybersecurity For Public Utilities Solutions II

Cybersecurity For Public Utilities Solutions II Cyberattacks launched on municipal utility companies are similar to attacks in any other industry. However, the potential for OT attacks and the dangers of a major service disruption has raised the stakes. Miller outlines in this article [1] the most common cybersecurity attacks that have affected municipal utility companies. Denial of Service Attacks that stop users from accessing essential networks are typically referred to as denial of service (DoS) or distributed denial of service (DDoS) attacks.

Continue reading

Cybersecurity For Public Utilities Solutions I

Cybersecurity For Public Utilities Solutions I In 2021 Jason Miller wrote an article on cybersecurity for municipal utilities stressing that cyber-attacks were increasing every year and greatly impacting a wide range of high-profile targets from governmental agencies to financial and insurance organizations, hospitals and other health facilities, and educational institutions. Of particular concern in many countries, he points out, is the situation on local levels where local governments with municipal utilities are often under-funded with poorly trained staff [1].

Continue reading

3 questions – 3 answers Christmas 2022 edition: The second CS-AWARE-NEXT Podcast

3 questions – 3 answers Christmas 2022 edition: The second CS-AWARE-NEXT Podcast We are happy to announce the second CS-AWARE-NEXT Podcast with Juha Röning! Juha is the Coordinator of the CS-AWARE-NEXT project and is Professor of Embedded Systems at the University of Oulu. Juha has also coordinated the original CS-AWARE project. He has three patents and has published more than 300 papers in the areas of computer vision, robotics, intelligent signal analysis, and software security.

Continue reading