Risk management and cybersecurity attacks

In the financial sphere, the risk is associated with uncertainty (possibility of fluctuations in value, both in a positive and negative sense). In cybersecurity, the events of interest are always linked to losses of value, but maintain the character of uncertainty. We are therefore interested in the random events concerning the IT security of [...]

2019-03-28T12:48:09+00:00March 28th, 2019|Blog|

Exploring Knowledge Graphs in an Interpretable Composite Approach for Text Entailment

AAAI 2019 : Thirty-Third AAAI conference on artificial intelligence Recognizing textual entailment is a key task for many semantic applications, such as Question Answering, Text Summarization, and Information Extraction, among others. Entailment scenarios can range from a simple syntactic variation to more complex semantic relationships between pieces of text, but most approaches try [...]

2021-02-12T21:56:06+00:00March 28th, 2019|Papers|

Open source technologies within the concept of self-healing

11th Panhellenic Free / Open Source Software Communities Meeting (FOSSCOM 2018), 13-14 October 2018, University of Crete, Heraklion, Crete, Greece. In this talk we'll discuss the main concepts of Self-Healing and analyse Self-Healing models. The analysis and evaluation of each model is done based on a set of criteria such as the management [...]

2021-02-12T21:56:54+00:00March 28th, 2019|Papers|

Cybersecurity & Economic Forum of Delphi

Delphi Economic Forum, one of the most prestigious Greek annual events took place between Thursday, February 28 and Sunday, March 3, 2019 aiming to identify the main global trends, assess their implications and review the resulting challenges and policy options confronting decision-makers of the wider Eastern Mediterranean Region.On the subject of cybersecurity, a fruitful debate [...]

2019-03-26T13:56:14+00:00March 26th, 2019|Blog|

Only 1/3 of the employees trust their digital skills

According to a study of the Vodafone Institute, that investigates the acceptability of new technologies in Europe, Asia and the USA, there is a global shortage of digital skill. In fact, only 29% of the employees consider their digital skills adequate, 85% acknowledges that, nowdays, digital skills are necessary at work, while 56% admit that [...]

2019-03-20T11:53:51+00:00March 20th, 2019|Blog|

Revenge porn: an open problem about privacy

In these days the problem of the revenge porn has been brought again to the attention of the italians by the case of Giulia Sarti. For the ill-unaware some intimate photos of the ex five-stars deputee Giulia Sarti has been shared online. Up to today we do not know who did this or why, but [...]

2019-03-20T11:54:30+00:00March 20th, 2019|Blog|

Cybersecurity act approved by European parliament

This Tuesday (13-03-2019) the European Parliament has approved the adoption of new norms to implement a certification system for Cybersecurity in the European Union. This system, aptly named Cybersecurity act, aims to guarantee that products and services sold on the European market will satisfy a certain standard for security requirements. A concern towards increased risks [...]

2019-03-20T11:39:56+00:00March 20th, 2019|Blog|

Hunt for security flaws with Windows Exploit Suggester

This software allows you to analyze the operating system to identify vulnerabilities and exploits that hackers can use to attack. How vulnerable are we to a cyber attack? Knowing it exactly is almost impossible. All we can do is to constantly update our software and operating system and, of course, use an antivirus program. Starting [...]

2019-03-20T11:34:52+00:00March 20th, 2019|Blog|

What is cryptojacking?

Cryptojacking (also called malicious cryptomining) is an emerging online threat that hides on people’s devices (computers, smartphones, tablets or even servers), without their consent or knowledge, and uses the machine’s resources to secretly mine cryptocurrencies. Cryptocurrency is a form of digital money that exist only in the online world, with no actual physical form. Users [...]

2019-03-20T11:35:31+00:00March 20th, 2019|Blog|

Cyber-Security: Members of the European Parliament Respond to the Chinese Digital Threat

Strasbourg 11-14/03/2019 Threats from China's growing technological presence in the EU, are referred to in a resolution that was deposited on Tuesday 12/03/2018. China's increased technological presence in the EU poses serious security threats requiring urgent action at EU level, says a draft resolution that was put to the vote on Tuesday 12/03/2019 in the [...]

2019-03-19T09:23:06+00:00March 19th, 2019|Blog|
Go to Top