What Is to Be Done? Burning questions of a hopefully cybersecure future in Europe
‘If we want a safer world for tomorrow, we have to act decidedly today and be ready to take some risks’ - Josep Borrell, High Representative of the European Union, My visit to Moscow and the future of EU-Russia relations [...]
The CS-AWARE spin out is here! Now starts the fun!
The final review of the CS-AWARE project took place on 25 November 2020. We weren’t able to meet face to face with consortium partners, the independent reviewers and our Project Officer. Our last “physical”, collocated meeting took place in [...]
7 social media tips for local governments
In Italy, the average age of government employees is over 50 years old. While increasing in recent years, the adoption rate of social media among municipal employees has been slow.According to Hootsuite, there tend to be two types of social [...]
Social media in government is a revolution for many
On social media, people can engage directly with politicians, municipal officials, and even government agencies.We all know how important it is for governments not only to adapt to a rapidly changing world but also how to take advantage of these [...]
Cyber vs. Humans — round one
Iam tech by trade and in my heart. I spent my youth reading and writing low level code. Still, in the field of cyber security I have learned not to underestimate humans. 🙂 This lesson was reinforced when I participated [...]
Shades of open source infosec tools
There are a lot of useful open source infosec tools for tasks like network administration, malware analysis, forensics and incident response. Sometimes analysis is done by dedicated cyber security analysts, but often one needs to use these tools only occasionally. [...]
International Institute for Cyber Security: Report on actions in the period 2019-2020
During the current period, the Institute received 22,400 telephone calls and 44,500 e-mails of citizens both in the call center and in text messages on its e-mail address and on the profiles, it maintains on social media (Facebook, Instagram, LinkedIn).The [...]
Impact of Coronavirus and crisis response on cybersecurity readiness
The detection of ransomware attacks continued to rise in 2019 and 2020. Even though many in local government and business are not at all convinced that they have in place adequate “incident response” (IR) plans, they see having an IR [...]
The log files protect digital places
Digital places need to be protected. A login system prevents an attacker or an unauthorized person from accessing data, the file system, the database, the repository. To ensure security, it is not only necessary to identify the user accessing the [...]