Vulnerabilities in organisations websites

Many web sites and electronic infrastructures of organisations have various security vulnerabilities and are subject to cyberattacks with significant consequences on organisations. Successful cyberattacks lead to consequences which have a direct impact on organisations’ infrastructure, leading to Malfunction of the organisation's electronic services, as well as other sectors. Successful attacks may lead to negative reputation [...]

2020-10-12T10:28:38+00:00August 30th, 2019|Blog|

Enhancing credibility of digital evidence through provenance-based incident response handling

ARES '19 Proceedings of the 14th International Conference on Availability, Reliability and Security ACM New York, NY, USA, 26-29 August 2019 Digital forensics are becoming increasingly important for the investigation of computer-related crimes, white-collar crimes and massive hacker attacks. After an incident has been detected an appropriate incident response is usually initiated with the [...]

2021-02-12T22:04:50+00:00August 29th, 2019|Papers|

A quantitative evaluation of trust in the quality of cyber threat intelligence sources

14th International Conference on Availability, Reliability and Security (ARES 2019) - Canterbury, United Kingdom, 26–29 August 2019 Thomas Schaberreiter, Veronika Kupfersberger, Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Christos Ilioudis, and Gerald Quirchmayr

2021-02-12T22:06:14+00:00August 29th, 2019|Papers|

Identifying Cybersecurity Anomalies with Risk Potential

When aiming to monitor an organization’s security 24/7, apart from breaches and attacks that are detected by existing tools, IT security specialists are interested in potential anomalies that seem transitory within IT systems. Sometimes such anomalies are just a random occurrence of multiple factors due to a pure technical set-up; other times they may have [...]

2019-10-03T14:36:54+00:00August 23rd, 2019|Blog|
Go to Top