Loading...
Blog2021-02-16T10:39:13+00:00
2305, 2018

Big-Data v.s. Denial-of-service

Denial-of-service (DoS) attacks and evermore distributed Dos (DDos) attacks are serious threats since they can easily bring down an IT infrastructure causing huge revenue loses. Currently, traditional anti-DDos solutions represents an conspicuous cost mainly for small and medium size companies. [...]

2105, 2018

Data Collection Challenges

3rdplace is currently developing an in-house solution to collect data from local municipalities and security is the forefront; especially because within cs-aware we are dealing with databases of sensitive information.Alongside the most common security vulnerabilities such as SQL Injections (SQLi), [...]

1705, 2018

Cyber security, risk management and policies

Nowadays, organisations, ranging from banks and government agencies to SMEs, depend heavily on the management of risks in order to preserve their existence, operation and profitability. This appears to be undeniable since risks exist in various forms, such as information [...]

805, 2018

Cybersecurity: You cannot neglect protecting essential services

Who is to blame if your facilities are attacked via network connections? Spring 2017 a global ransomware attack, WannaCry Ransomware, got lot of attention hitting companies, organizations and individual persons. Estimations of its impact were varying but numbers revealed claim [...]

2704, 2018

Controlling human behaviour in information security

Some will argue the perspective that human nature is complex by default. Behaviour is a state which can be influenced by numerous factors such as experience, emotions, family and friends, regulations, personal life and the list goes on. Therefore, a [...]

2004, 2018

The growing importance of cyber security

New technologies are increasing our attack surface: Machine Learning, devices of the Internet of Things and Blockchain pervade the current technological context. Today there are opportunities unthinkable until a few years ago that open up new innovative scenarios. The downside [...]

704, 2018

Everything but … the framework

I think I ‘met’ first time the term ‘framework’ in my first years of my professional ‘career’. Anything that was too vague to be of immediate practical use, too general to be regarded as a methodology (or a method), something [...]

604, 2018

The challenge of the Internet of Systems

The most demanding challenge for cyber security in the digital transformation of enterprises, public institutions and citizens is nowadays represented by the  integration of different systems, which must work together to offer new services and open new market channels. [...]

Go to Top