Status

Lessons learnt from cyber-attacks on Greek municipalities

Lessons learnt from cyber-attacks on Greek municipalities Just how hard is to describe the importance of a service whose value the customers cannot quite comprehend or quantify in order to invest in it in the Greek public sector? If one had to answer this question, he would have to give many answers, depending on various factors. It is incredibly difficult for an organisation to fully comprehend the need and the importance of cybersecurity service or product when he hasn’t been exposed or harmed by a cyber-attack.

Continue reading

New Cybersecuirty Master's Program in Oulu

New Cybersecuirty Master’s Program in Oulu Cyber security is a new study option based on the research excellence in software security at the University of Oulu. The student specialising in cyber security will be able to design, develop, test and evaluate systems, software or hardware for security goals in the ever evolving digital landscape​. As a whole, artificial intelligence and the development of different AI solutions play a role in all four study options.

Continue reading

New Cybersecurity Master's Program in Oulu

New Cybersecurity Master’s Program in Oulu Cybersecurity is a new study option based on the research excellence in software security at the University of Oulu. The student specialising in cybersecurity will be able to design, develop, test and evaluate systems, software or hardware for security goals in the ever evolving digital landscape​. As a whole, artificial intelligence and the development of different AI solutions play a role in all four study options.

Continue reading

CS-AWARE NEXT received support from the Horizon Standardisation Booster

CS-AWARE NEXT received support from the Horizon Standardisation Booster Our project had the opportunity to receive advisory services by the HSbooster.eu that is a European Commission initiative aiming to provide expert services to European projects to help them to increase and valorise project results by contributing to the creation of new or improvement of existing standards. As presented in the final expert report, ‘the whole HSBooster consultancy process with CS-AWARE NEXT went fluently and there was great support by the team of CS-AWARE NEXT to identify a suitable standardisation strategy for their envisioned project results’.

Continue reading

Enhancing your security with open-source tools

Enhancing your security with open-source tools With cybersecurity gaining increased attention in Italy, it has emerged as the top priority for digital investment among businesses in 2023. Notably, both large enterprises and SMEs recognize the significance of robust cybersecurity measures. Recent data reveals that a staggering 61% of organisations with over 250 employees have chosen to boost their cybersecurity budgets in the past year. Moreover, the Italian cybersecurity market is projected to witness remarkable growth, reaching a value of 1.

Continue reading

Συμμετοχή της ΔΕΥΑΛ στην 3η συνάντηση του Ευρωπαϊκού Προγράμματος CS-AWARE-Next στην πόλη Caltagirone της Κατάνια

Συμμετοχή της ΔΕΥΑΛ στην 3η συνάντηση του Ευρωπαϊκού Προγράμματος CS-AWARE-Next στην πόλη Caltagirone της Κατάνια https://www.deyal.gr/el/enimerwsi/nea-anakoinwseis/item/3058-symmetoxi-tis-deval-stin-3i-synantisi-tou-evropaikoy-programmatos-cs-aware-next-stin-poli-caltagirone-tis-katania

Continue reading

NIS2 – Key Challenges on the Horizon

NIS2 – Key Challenges on the Horizon About ten years ago the proposal of the original NIS-Directive was introduced into our lives. It was the first cybersecurity act in the EU, creating a new baseline for cybersecurity. Unfortunately the effects of the original NIS weren’t as good as initially hoped. Its objectives of increasing the level of security of network and information systems across the union were hindered by problems regarding different levels of resilience among member states, insufficient resilience of individual organisations, and ineffective oversight by government authorities.

Continue reading

A step towards DORA Compliance

A step towards DORA Compliance Most organizations, regardless of the vertical, are often engaged in complex and massive interconnections leading to some security challenges. As a result, individual and local initiatives alone may not suffice to effectively defend against current and future threats. Indeed, more synergy and collaboration amongst companies that are “shareholders in security” hence affected by the breach from others, is essential. Recent EU cybersecurity initiatives including the NIS/NIS2 and DORA for the financial sector have ought to address the cybersecurity and resilience of both, organizations delivering essential and vital services on the one hand, and the financial services, on the other.

Continue reading

The legend of The Scottish Thistle - the early version of a socio-technical defence system!

The legend of The Scottish Thistle - the early version of a socio-technical defence system! Technology is getting both advanced and effective, but what good does it do if we don’t understand and use it properly? Humans have a long history of using tools to help us make our jobs easier or for keeping us safe. However, technology can only do so much on it’s own. It needs a human touch to fulfil its full potential.

Continue reading

Supervised vs automated response to cyberthreats

Supervised vs automated response to cyberthreats Cyberthreats are continually becoming more sophisticated, thus creating a demand for an equally advanced threat detection and response. Detection of cyberthreats can very much benefit from the adoption of AI, as it is able to detect attack patterns and perform correlations among various security-related events. However, when it comes to incident handling, a fully AI-enabled approach may actually cause more harm than good, due to the critical human factors involved.

Continue reading