‘If we want a safer world for tomorrow, we have to act decidedly today and be ready to take some risks’ - Josep Borrell, High Representative of the European Union, My visit to Moscow and the future of EU-Russia relations [...]
The final review of the CS-AWARE project took place on 25 November 2020. We weren’t able to meet face to face with consortium partners, the independent reviewers and our Project Officer. Our last “physical”, collocated meeting took place in [...]
In Italy, the average age of government employees is over 50 years old. While increasing in recent years, the adoption rate of social media among municipal employees has been slow.According to Hootsuite, there tend to be two types of social [...]
On social media, people can engage directly with politicians, municipal officials, and even government agencies.We all know how important it is for governments not only to adapt to a rapidly changing world but also how to take advantage of these [...]
Iam tech by trade and in my heart. I spent my youth reading and writing low level code. Still, in the field of cyber security I have learned not to underestimate humans. 🙂 This lesson was reinforced when I participated [...]
There are a lot of useful open source infosec tools for tasks like network administration, malware analysis, forensics and incident response. Sometimes analysis is done by dedicated cyber security analysts, but often one needs to use these tools only occasionally. [...]
During the current period, the Institute received 22,400 telephone calls and 44,500 e-mails of citizens both in the call center and in text messages on its e-mail address and on the profiles, it maintains on social media (Facebook, Instagram, LinkedIn).The [...]
The detection of ransomware attacks continued to rise in 2019 and 2020. Even though many in local government and business are not at all convinced that they have in place adequate “incident response” (IR) plans, they see having an IR [...]
Digital places need to be protected. A login system prevents an attacker or an unauthorized person from accessing data, the file system, the database, the repository. To ensure security, it is not only necessary to identify the user accessing the [...]
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.