Big-Data v.s. Denial-of-service
Denial-of-service (DoS) attacks and evermore distributed Dos (DDos) attacks are serious threats since they can easily bring down an IT infrastructure causing huge revenue loses. Currently, traditional anti-DDos solutions represents an conspicuous cost mainly for small and medium size companies. [...]
Data Collection Challenges
3rdplace is currently developing an in-house solution to collect data from local municipalities and security is the forefront; especially because within cs-aware we are dealing with databases of sensitive information.Alongside the most common security vulnerabilities such as SQL Injections (SQLi), [...]
Cyber security, risk management and policies
Nowadays, organisations, ranging from banks and government agencies to SMEs, depend heavily on the management of risks in order to preserve their existence, operation and profitability. This appears to be undeniable since risks exist in various forms, such as information [...]
Cybersecurity: You cannot neglect protecting essential services
Who is to blame if your facilities are attacked via network connections? Spring 2017 a global ransomware attack, WannaCry Ransomware, got lot of attention hitting companies, organizations and individual persons. Estimations of its impact were varying but numbers revealed claim [...]
Planning for the second iteration of the analysis of the pilot scenarios
Working in Vienna for a couple to days this week to plan for the second iteration of the analysis of the pilot scenarios. The second iteration will create and validate the representation of the dependency analysis using the PROTOS-MATINE GraphingWiki. [...]
Controlling human behaviour in information security
Some will argue the perspective that human nature is complex by default. Behaviour is a state which can be influenced by numerous factors such as experience, emotions, family and friends, regulations, personal life and the list goes on. Therefore, a [...]
The growing importance of cyber security
New technologies are increasing our attack surface: Machine Learning, devices of the Internet of Things and Blockchain pervade the current technological context. Today there are opportunities unthinkable until a few years ago that open up new innovative scenarios. The downside [...]
Everything but … the framework
I think I ‘met’ first time the term ‘framework’ in my first years of my professional ‘career’. Anything that was too vague to be of immediate practical use, too general to be regarded as a methodology (or a method), something [...]
The challenge of the Internet of Systems
The most demanding challenge for cyber security in the digital transformation of enterprises, public institutions and citizens is nowadays represented by the integration of different systems, which must work together to offer new services and open new market channels. [...]