About CS-AWARE

This author has not yet filled in any details.
So far CS-AWARE has created 176 blog entries.

Island hopping: a new cybersecurity threats for Italian organizations

The mentioned recent survey executed by Opinion Matters on a sample of 2,000 firms about the cybersecurity in the Italian enterprises put the accent on the most common cyber threats. From the survey it results the most frequent cause of security violations has been the so-called “island hopping” (26%): the attack strategy of the hackers [...]

2021-02-16T19:51:11+00:00August 1st, 2020|Blog|

The pros and the cons of the democratization of cybersecurity: the need of a solid framework

We may wonder whether the increasingly popularity of cybersecurity is a benefit or a problem itself? Sometimes when awareness raises, there is also an increasing in considering a very serious discipline which impacts technical and legal issues as a mere buzzword. In order to avoid such a risk, a solid methodological and operational framework might [...]

2021-02-16T19:51:11+00:00July 31st, 2020|Blog|

A survey reports: increase of cyberattacks to Italian enterprises in the last 12 months

In the last 12 months the Italian enterprises have been targeted with a an increasing of cyberattacks both in terms of volumes and in terms of level of violation. As a consequence, the Italian enterprises, in order to mitigate cyber risks, are growing investments in the cybersecurity field.These are the results of an Italian cybersecurity [...]

2021-02-16T19:51:11+00:00July 30th, 2020|Blog|

Year 2019 as the “The Year of Ransoming Governments” accordingly with “2020 Cybersecurity Outlook Report”

The recent “2020 Cybersecurity Outlook Report” published by VM Carbon Black focuses on new cybersecurity threats. The report includes an in-depth analysis of the various sources and forms of cyberattacks. A notable fact is the 2019 could be considered could have been referred to as “The Year of Ransoming Governments”.The sample includes 2,000 organizations and [...]

2021-02-16T19:51:11+00:00July 29th, 2020|Blog|

Collateral Benefits and Advantages of conducting a PIA/DPIA?

When being faced with the necessity of conducting a privacy impact assessment / data processing impact assessment (PIA/DPIA), the first considerations are usually devoted to the potentially substantial effort involved.However, from an information security point of view, this might also be a golden opportunity for identifying threats and vulnerabilities to information systems that are critical [...]

2021-02-16T19:51:11+00:00July 28th, 2020|Blog|

The CS-AWARE system and dependency graph

One of the challenges of CS-AWARE was to be able to represent analysis results of socio-technical system and dependency analysis, which is highly depended on the individual organization that is analysed, in a structured and machine readable form so that this information can be used to configure a CS-AWARE instance to the individual needs of [...]

2021-02-16T19:51:11+00:00July 22nd, 2020|Blog|

Greeks are vulnerable to internet threats

It is difficult to underestimate the importance and role of the Internet in modern relationships - keeping in touch with friends and acquaintances, family friends or looking for romantic partners. While a whole new world of possibilities has opened up, it is well known that the internet is a huge place that hides threats to [...]

2021-02-16T19:51:12+00:00July 21st, 2020|Blog|

COVID-19: The new reality in cybersecurity

Most companies do not have adequate security systems to support remote work and now have to face the new reality of COVID-19, which includes a wider range of attacks and less secure devices. Many companies also had to quickly adapt and adopt various digital tools, using new technologies that may not be sufficiently secure.The 21% [...]

2020-10-12T11:22:51+00:00July 20th, 2020|Blog|

The Dutch Situation: where is the awareness?

In line with the national “Digital Agenda 2020” Dutch municipalities, organised in the VNG (Association of Dutch Municipalities) aim for a common approach for implementing ICT services. This had resulted in the objective by VNG for a common municipal digital infrastructure (GGI) that is supposed to support better and safer collaboration between municipalities. GGI is [...]

2020-10-05T07:40:19+00:00July 20th, 2020|Blog|

Municipalities: A new Eldorado for cybercriminals?

Our society is dependable of information networks. Cyberattacks against cities and municipalities have come alarmingly everyday incidents. In USA there were more 100 ransomware attacks against public administrations (schools and local governments)1. The cost of a single attack can be very high. Georgia city’s computer network was struck in March 2018 causing loss of services [...]

2020-07-17T08:46:46+00:00July 10th, 2020|Blog|
Go to Top