Loading...
Blog2021-02-16T10:39:13+00:00
1903, 2018

Cyber threats in the Financial Industry

A report done by PwC in 2014 in cooperation with BBA (British Banking Association) highlights very interesting aspects and challenges of the financial and banking industry that are highly relevant for our CS-AWARE project: Malicious actors identified •       Hacktivists [...]

1303, 2018

Designing the CS-AWARE Framework

The final CS-AWARE solution is a combination of a generalized model of interconnected technologies, the framework, and their individualised implementation at a local public administration (LPA). In Software Architecture Design frameworks build the foundation for such structures of components, as [...]

203, 2018

The value of good design (part 1)

The value of a good user interface is indisputable: with a good user interface, all features and functionality are supported; with a ‘bad’ or a ‘poor’ one, the users will ignore your product and will punish you to stay off [...]

203, 2018

The value of good design (part 2)

In the project, one of the tasks that we have been assigned related to visualization. No need to say how important this is: with poor visualization every information will be lost or subject to misinterpretation – with a good one, [...]

203, 2018

Cyber Security in Public Administration

The rapid and high-speed development of services in the "cyber-space", on the one hand, has innumerable advantages, such as the breaking down of geographical borders, through the interconnection of billions of people, the delivery of new types of services and [...]

2202, 2018

Working with municipalities about innovative technology

Our company has more than 20 years of experience of working with with new technologies, at first in educational contexts. There was a period when schools liked new approaches to learning they thought interactive technology would afford. What we, and [...]

1602, 2018

The Benefits of Cyberthreat Information Exchange

Cyberattacks have attracted interest due to both the frequency that successful attacks occur at, as well as the strong impact they may have on organisations. In response to this, the security industry developed a variety of products and solutions providing [...]

Go to Top