Cybersecurity in the EU & the NIS Directive

Whilst everyone in the European Union was leaving the last couple of weeks the frantic rhythms of preparation for the adaptation of the GDPR (May 25, 2018), another crucial EU legislation was getting into effect, regarding cybersecurity. Specifically, by the 9th of May 2018, all Member States should have transposed into their national legislation the [...]

2018-05-29T19:12:17+00:00May 29th, 2018|Blog|

Big-Data v.s. Denial-of-service

Denial-of-service (DoS) attacks and evermore distributed Dos (DDos) attacks are serious threats since they can easily bring down an IT infrastructure causing huge revenue loses. Currently, traditional anti-DDos solutions represents an conspicuous cost mainly for small and medium size companies. Those costs are even more significant for public institutions.A modern and effective strategy to fight [...]

2018-05-27T19:09:54+00:00May 23rd, 2018|Blog|

Data Collection Challenges

3rdplace is currently developing an in-house solution to collect data from local municipalities and security is the forefront; especially because within cs-aware we are dealing with databases of sensitive information.Alongside the most common security vulnerabilities such as SQL Injections (SQLi), XSS (Cross Site Scripting) and Cross Site Request Forgery, which affect most contemporary programming languages, [...]

2018-05-21T08:09:01+00:00May 21st, 2018|Blog|

Cyber security, risk management and policies

Nowadays, organisations, ranging from banks and government agencies to SMEs, depend heavily on the management of risks in order to preserve their existence, operation and profitability. This appears to be undeniable since risks exist in various forms, such as information security, compliance, reputational and outsourcing risks. If those risks are not identified, assessed and mitigated [...]

2018-05-17T12:33:14+00:00May 17th, 2018|Blog|

Cybersecurity: You cannot neglect protecting essential services

Who is to blame if your facilities are attacked via network connections? Spring 2017 a global ransomware attack, WannaCry Ransomware, got lot of attention hitting companies, organizations and individual persons. Estimations of its impact were varying but numbers revealed claim that it infected more than 230,000+ computers in 150 countries. A shocking part of the [...]

2018-05-08T18:39:57+00:00May 8th, 2018|Blog|

Planning for the second iteration of the analysis of the pilot scenarios

Working in Vienna for a couple to days this week to plan for the second iteration of the analysis of the pilot scenarios. The second iteration will create and validate the representation of the dependency analysis using the PROTOS-MATINE GraphingWiki. Chris Wills CARIS Research Ltd.

2018-05-08T18:46:04+00:00May 8th, 2018|Blog|
Go to Top