Cybersecurity

Information Society is leading the battle for Cybersecurity

Information Society is leading the battle for Cybersecurity The Ministry of Digital Governance (MDG) in Greece is implementing a set of projects through Information Society for the protection of public bodies against cyberattacks. Cybersecurity in the public sector is crucial for safeguarding sensitive information, ensuring the integrity of essential services, and maintaining public trust. Government agencies handle vast amounts of personal data and critical infrastructure, making them prime targets for cyberattacks.

Continue reading

The importance of user role definition and access restrictions

The importance of user role definition and access restrictions Many of us have seen the cinematic masterpiece called The Lord of the Rings and can recall the scene where Pippin Took touches The Palantír (the glass orb looking thing with the eye of Sauron in it) and thus gave said villain an insight to his mind. The bad news: Sauron knows everything Pippin knows. The good news: Pippin doesn’t know anything!

Continue reading

New Cybersecuirty Master's Program in Oulu

New Cybersecuirty Master’s Program in Oulu Cyber security is a new study option based on the research excellence in software security at the University of Oulu. The student specialising in cyber security will be able to design, develop, test and evaluate systems, software or hardware for security goals in the ever evolving digital landscape​. As a whole, artificial intelligence and the development of different AI solutions play a role in all four study options.

Continue reading

New Cybersecurity Master's Program in Oulu

New Cybersecurity Master’s Program in Oulu Cybersecurity is a new study option based on the research excellence in software security at the University of Oulu. The student specialising in cybersecurity will be able to design, develop, test and evaluate systems, software or hardware for security goals in the ever evolving digital landscape​. As a whole, artificial intelligence and the development of different AI solutions play a role in all four study options.

Continue reading

CS-AWARE NEXT received support from the Horizon Standardisation Booster

CS-AWARE NEXT received support from the Horizon Standardisation Booster Our project had the opportunity to receive advisory services by the HSbooster.eu that is a European Commission initiative aiming to provide expert services to European projects to help them to increase and valorise project results by contributing to the creation of new or improvement of existing standards. As presented in the final expert report, ‘the whole HSBooster consultancy process with CS-AWARE NEXT went fluently and there was great support by the team of CS-AWARE NEXT to identify a suitable standardisation strategy for their envisioned project results’.

Continue reading

Enhancing your security with open-source tools

Enhancing your security with open-source tools With cybersecurity gaining increased attention in Italy, it has emerged as the top priority for digital investment among businesses in 2023. Notably, both large enterprises and SMEs recognize the significance of robust cybersecurity measures. Recent data reveals that a staggering 61% of organisations with over 250 employees have chosen to boost their cybersecurity budgets in the past year. Moreover, the Italian cybersecurity market is projected to witness remarkable growth, reaching a value of 1.

Continue reading

Cybersecurity – a case for advanced decision models

Cybersecurity – a case for advanced decision models Advanced attacks demand advanced countermeasures. On a technical level there already is an elevated level of awareness and readiness. That is why in a first wave of attacks criminals usually focus on tricking users into opening up systems for them . While this has now been the rule for at least over a decade, the way in which these attacks are prepared now follow an almost military style approach.

Continue reading

Data poisoning attacks

Data poisoning attacks Data poisoning is an increasingly important security concern for Machine Learning (ML) systems. As machine learning models are becoming more prevalent in our lives, they are also becoming more vulnerable to malicious attacks. Data poisoning attacks are one of the most insidious and difficult-to-detect kinds of threats on ML models. Data poisoning is a type of adversarial attack in which a cybercriminal injects malicious data into a machine learning model.

Continue reading

Massive increase in cyber attacks in 2022

Massive increase in cyber attacks in 2022 Universities, research centers, state and military services, hospitals, communication infrastructure and banks have received numerous cyberattacks in 2022; and the worst is yet to come. It is estimated that more than 1.000 cyberattacks per organisation take place throughout the universe, which is 38% more than 2021. In Europe in particular, the average number of attacks per target reached 1.000, with an increase of 26% when compared to 2021.

Continue reading

CriM -- Cyber Security Seminar and Workshops -- 2022

CriM - Engaging the next generation of cyber security professionals During November 2022 we held the Cyber Security Seminar and Workshops in Oulu, Finland. This four days event has been held since 1999 and brings together teachers, researchers, experts, and students of cybersecurity: https://www.oulu.fi/en/crim. CriM had twelve talks before lunch and three exercises in the afternoon, covering topics from incidence response to password handling. We were especially glad to hear a talk from Bart Preneel, Europe’s most pronounced cryptography expert, who reminded us at the end of his presentation to a quote from Immanuel Kant “Optimism is a moral duty”.

Continue reading