About CS-AWARE

This author has not yet filled in any details.
So far CS-AWARE has created 176 blog entries.

AI or not AI; that’s the question

The National Institute of Standards and Technology have had plans to move to a vulnerability scoring method that uses IBM’s Watson artificial intelligence system by October 2019. So far, Watson stumbled when evaluating new and complex vulnerabilities. AI is sneaking in to cyber security business. Does it make us stronger or more vulnerable? AI [...]

2019-12-31T09:06:03+00:00December 31st, 2019|Blog|

Interoperability challenges of cyberthreat intelligence

Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security analysis, threat intelligence helps reduce the time between the detection of an attack and its containment. This is achieved by continuously providing [...]

2020-10-12T10:13:21+00:00November 29th, 2019|Blog|

Cyber Security Act Regulation: An Italian Perspective

One year after the Network and Information Security Directive, the European Parliament and the Council adopted the Cyber Security Act Regulation. The two acts, together with the GDPR, constitute the pan-European digital security system, according to an article signed by Isabella Alessandrucci, Lawyer and Auditor ISO / IEC27001 - 37001 - 9001 on Digital [...]

2019-11-10T19:24:20+00:00November 6th, 2019|Blog|

An Information Flow Model to Support NIS Mandated Reporting

Automous Systems 2019: An Almanac 137-143, 12th Conference on Autonomous Systems  - Cala Millor, Mallorca, Spanien 23-30 October 2019 Gerald Quirchmayir, Veronika Kupfersberger, Gregor Langner, Thomas Schaberreiter

2021-02-12T21:53:25+00:00October 30th, 2019|Papers|

Governments need to fund adequately their innovation efforts

While the Government here in Italy has announced various changes and plans to reorganize the cybersecurity effort on a national level, it is not clear the practical effect of these proposals. Recently the organization of a new ministry for technological innovation and digitalization with Paola Pisano as its head was announced.  Already from the initial [...]

2019-10-30T09:56:32+00:00October 25th, 2019|Blog|

System and dependency analysis workshop in Larissa and Rome – The difference in conducting analysis in a mid-sized and a large municipality

In a previous blog post we discussed the third round of system and dependency analysis workshops conducted in the context of the CS-AWARE project in the municipalities of Larissa and Rome. In this post we would like to discuss in a bit more detail our experiences of the similarities and differences of conducting the workshop [...]

2019-11-22T09:26:59+00:00October 10th, 2019|Blog|

The best training is … no training (or the value of building intuitive systems like ours!)

Some weeks before, in that period that Germans call “Sommerloch” (good question how to translate this in English: something like a summer gap might make sense…) we had the opportunity to look to some other projects, and how they support dissemination and uptake through leveraging training activities for potential customers and end users so that [...]

2019-09-11T13:59:24+00:00September 11th, 2019|Blog|

Vulnerabilities in organisations websites

Many web sites and electronic infrastructures of organisations have various security vulnerabilities and are subject to cyberattacks with significant consequences on organisations. Successful cyberattacks lead to consequences which have a direct impact on organisations’ infrastructure, leading to Malfunction of the organisation's electronic services, as well as other sectors. Successful attacks may lead to negative reputation [...]

2020-10-12T10:28:38+00:00August 30th, 2019|Blog|

Enhancing credibility of digital evidence through provenance-based incident response handling

ARES '19 Proceedings of the 14th International Conference on Availability, Reliability and Security ACM New York, NY, USA, 26-29 August 2019 Digital forensics are becoming increasingly important for the investigation of computer-related crimes, white-collar crimes and massive hacker attacks. After an incident has been detected an appropriate incident response is usually initiated with the [...]

2021-02-12T22:04:50+00:00August 29th, 2019|Papers|
Go to Top