The pros and the cons of the democratization of cybersecurity: the need of a solid framework

We may wonder whether the increasingly popularity of cybersecurity is a benefit or a problem itself? Sometimes when awareness raises, there is also an increasing in considering a very serious discipline which impacts technical and legal issues as a mere buzzword. In order to avoid such a risk, a solid methodological and operational framework might [...]

2021-02-16T19:51:11+00:00July 31st, 2020|Blog|

A survey reports: increase of cyberattacks to Italian enterprises in the last 12 months

In the last 12 months the Italian enterprises have been targeted with a an increasing of cyberattacks both in terms of volumes and in terms of level of violation. As a consequence, the Italian enterprises, in order to mitigate cyber risks, are growing investments in the cybersecurity field.These are the results of an Italian cybersecurity [...]

2021-02-16T19:51:11+00:00July 30th, 2020|Blog|

Year 2019 as the “The Year of Ransoming Governments” accordingly with “2020 Cybersecurity Outlook Report”

The recent “2020 Cybersecurity Outlook Report” published by VM Carbon Black focuses on new cybersecurity threats. The report includes an in-depth analysis of the various sources and forms of cyberattacks. A notable fact is the 2019 could be considered could have been referred to as “The Year of Ransoming Governments”.The sample includes 2,000 organizations and [...]

2021-02-16T19:51:11+00:00July 29th, 2020|Blog|

Collateral Benefits and Advantages of conducting a PIA/DPIA?

When being faced with the necessity of conducting a privacy impact assessment / data processing impact assessment (PIA/DPIA), the first considerations are usually devoted to the potentially substantial effort involved.However, from an information security point of view, this might also be a golden opportunity for identifying threats and vulnerabilities to information systems that are critical [...]

2021-02-16T19:51:11+00:00July 28th, 2020|Blog|

The CS-AWARE system and dependency graph

One of the challenges of CS-AWARE was to be able to represent analysis results of socio-technical system and dependency analysis, which is highly depended on the individual organization that is analysed, in a structured and machine readable form so that this information can be used to configure a CS-AWARE instance to the individual needs of [...]

2021-02-16T19:51:11+00:00July 22nd, 2020|Blog|

Greeks are vulnerable to internet threats

It is difficult to underestimate the importance and role of the Internet in modern relationships - keeping in touch with friends and acquaintances, family friends or looking for romantic partners. While a whole new world of possibilities has opened up, it is well known that the internet is a huge place that hides threats to [...]

2021-02-16T19:51:12+00:00July 21st, 2020|Blog|

COVID-19: The new reality in cybersecurity

Most companies do not have adequate security systems to support remote work and now have to face the new reality of COVID-19, which includes a wider range of attacks and less secure devices. Many companies also had to quickly adapt and adopt various digital tools, using new technologies that may not be sufficiently secure.The 21% [...]

2020-10-12T11:22:51+00:00July 20th, 2020|Blog|

The Dutch Situation: where is the awareness?

In line with the national “Digital Agenda 2020” Dutch municipalities, organised in the VNG (Association of Dutch Municipalities) aim for a common approach for implementing ICT services. This had resulted in the objective by VNG for a common municipal digital infrastructure (GGI) that is supposed to support better and safer collaboration between municipalities. GGI is [...]

2020-10-05T07:40:19+00:00July 20th, 2020|Blog|

Municipalities: A new Eldorado for cybercriminals?

Our society is dependable of information networks. Cyberattacks against cities and municipalities have come alarmingly everyday incidents. In USA there were more 100 ransomware attacks against public administrations (schools and local governments)1. The cost of a single attack can be very high. Georgia city’s computer network was struck in March 2018 causing loss of services [...]

2020-07-17T08:46:46+00:00July 10th, 2020|Blog|

On Cybersecurity awareness

During the past 8 months we have deployed and tested the CS-AWARE system in the contexts of the municipalities of Rome and Larissa. We have worked intensively with the users, collected and implemented their feedback, tried to understand how cybersecurity is handled in their contexts, and how CS-AWARE can make a positive impact. A crucial [...]

2020-07-17T08:49:45+00:00July 7th, 2020|Blog|
Go to Top