Whilst everyone in the European Union was leaving the last couple of weeks the frantic rhythms of preparation for the adaptation of the GDPR (May 25, 2018), another crucial EU legislation was getting into effect, regarding cybersecurity. Specifically, by the 9th of May 2018, all Member States should have transposed into their national legislation the [...]
Denial-of-service (DoS) attacks and evermore distributed Dos (DDos) attacks are serious threats since they can easily bring down an IT infrastructure causing huge revenue loses. Currently, traditional anti-DDos solutions represents an conspicuous cost mainly for small and medium size companies. Those costs are even more significant for public institutions.A modern and effective strategy to fight [...]
3rdplace is currently developing an in-house solution to collect data from local municipalities and security is the forefront; especially because within cs-aware we are dealing with databases of sensitive information.Alongside the most common security vulnerabilities such as SQL Injections (SQLi), XSS (Cross Site Scripting) and Cross Site Request Forgery, which affect most contemporary programming languages, [...]
Nowadays, organisations, ranging from banks and government agencies to SMEs, depend heavily on the management of risks in order to preserve their existence, operation and profitability. This appears to be undeniable since risks exist in various forms, such as information security, compliance, reputational and outsourcing risks. If those risks are not identified, assessed and mitigated [...]
Who is to blame if your facilities are attacked via network connections? Spring 2017 a global ransomware attack, WannaCry Ransomware, got lot of attention hitting companies, organizations and individual persons. Estimations of its impact were varying but numbers revealed claim that it infected more than 230,000+ computers in 150 countries. A shocking part of the [...]
Working in Vienna for a couple to days this week to plan for the second iteration of the analysis of the pilot scenarios. The second iteration will create and validate the representation of the dependency analysis using the PROTOS-MATINE GraphingWiki. Chris Wills CARIS Research Ltd.