This author has not yet filled in any details.
So far CS-AWARE has created 176 blog entries.

The CS-AWARE spin out is here! Now starts the fun!

The final review of the CS-AWARE project took place on 25 November 2020. We weren’t able to meet face to face with consortium partners, the independent reviewers and our Project Officer. Our last “physical”, collocated meeting took place in Milano last February and few weeks later our interim review in Brussels. Then Corona and [...]

2021-02-16T19:51:11+00:00January 26th, 2021|Blog|

An Innovative Self-Healing Approach with STIX Data Utilisation

Spyros, Arnolnt; Rantos, Konstantinos; Papanikolaou, Alexandros; Ilioudis, Christos Organisations nowadays devote many resources in maintaining a robust security posture against emerging cyber-threats. This typically requires rapid response against newly identified or shared threat information so that appropriate countermeasures are immediately deployed to eliminate these threats or reduce the associated risks. For many shared indicators, [...]

2021-02-16T19:51:11+00:00October 7th, 2020|Papers|

7 social media tips for local governments

In Italy, the average age of government employees is over 50 years old. While increasing in recent years, the adoption rate of social media among municipal employees has been slow.According to Hootsuite, there tend to be two types of social media accounts out there: soapboxes and dinner parties .The social media account used as a [...]

2021-02-16T19:51:11+00:00August 31st, 2020|Blog|

Social media in government is a revolution for many

On social media, people can engage directly with politicians, municipal officials, and even government agencies.We all know how important it is for governments not only to adapt to a rapidly changing world but also how to take advantage of these new forms of communication.In this post, we break down some of the benefits of using [...]

2021-02-16T19:51:11+00:00August 31st, 2020|Blog|

Cyber vs. Humans — round one

Iam tech by trade and in my heart. I spent my youth reading and writing low level code. Still, in the field of cyber security I have learned not to underestimate humans. :) This lesson was reinforced when I participated in two hackathons related to helping humans in the extraordinary times we live in. Here [...]

2021-02-16T19:51:11+00:00August 31st, 2020|Blog|

Shades of open source infosec tools

There are a lot of useful open source infosec tools for tasks like network administration, malware analysis, forensics and incident response. Sometimes analysis is done by dedicated cyber security analysts, but often one needs to use these tools only occasionally. How to serve occasional users whose profession is not cyber security per se, but who [...]

2021-02-16T19:51:11+00:00August 28th, 2020|Blog|

International Institute for Cyber Security: Report on actions in the period 2019-2020

During the current period, the Institute received 22,400 telephone calls and 44,500 e-mails of citizens both in the call center and in text messages on its e-mail address and on the profiles, it maintains on social media (Facebook, Instagram, LinkedIn).The International Cyber Security Institute (CSI Institute) informs the citizens about the actions it carried out [...]

2021-02-16T19:51:11+00:00August 18th, 2020|Blog|

Impact of Coronavirus and crisis response on cybersecurity readiness

The detection of ransomware attacks continued to rise in 2019 and 2020. Even though many in local government and business are not at all convinced that they have in place adequate “incident response” (IR) plans, they see having an IR plan as the best way to prepare for a security issue. Many local governments and [...]

2021-02-16T19:51:11+00:00August 10th, 2020|Blog|

The log files protect digital places

Digital places need to be protected. A login system prevents an attacker or an unauthorized person from accessing data, the file system, the database, the repository. To ensure security, it is not only necessary to identify the user accessing the system but it is also necessary to track the operations that the user performs. The [...]

2021-02-16T19:51:11+00:00August 10th, 2020|Blog|

Emergency Covid-19, smart working: train to digital awareness

The Coronavirus emergency has accelerated the use of remote work and study methods. The advantages offered by these new forms of activity are numerous but the risks related to IT security are often underestimated. During the Covid-19 emergency there was a peak of cyber attacks, which hit the education, finance and health sectors most. The [...]

2021-02-16T19:51:11+00:00August 10th, 2020|Blog|
Go to Top