Loading...

5G era and cybersecurity

Fifth-generation mobile networks or fifth-generation wireless systems, also known as “5G,” are the proposed next telecommunications standards and are likely to appear in the market in 2020. 5G networks are going to be very heterogeneous and complex compared to the current ones but in the same time are expected to meet high-end requirements. Among them, [...]

2019-01-09T12:11:13+00:00November 14th, 2018|Blog|

Common sense and the CS-AWARE platform: How to launch it and make the ‘great leap forward’…

There have been two articles that both appeared in Harvard Business Review and which I think are quite useful when considering the steps we need to take for exploitation and commercialization of the CS-AWARE project results.The first one is called ‘How to Launch Your Digital Platform’, has been authored by Benjamin Edelman and appeared in [...]

2018-11-05T12:52:03+00:00November 5th, 2018|Blog|

Testing the CS-AWARE Information Flow Model using Docker

To test the the CS-AWARE information flow model a prototype using the Docker Container[1] technology was implemented. The aim was to create a Docker-Compose implementation, which is a Docker framework to develop systems using multiple containers, representing the model introduced in this previous blog entry in a basic version. The concept of containerization through [...]

2018-10-15T16:45:05+00:00October 15th, 2018|Blog|

Cybertech Europe 2018

On 26th and 27th September 2018 in Rome  has been held the Cybertech conference. It was a very important conference regarding  information technology and cyber security, bringing together leading multinational companies, SMEs, start-ups, private and corporate investors, venture capital companies, experts and clients. The main objectives of the conference was networking. More than 100 companies, [...]

2018-10-03T11:12:36+00:00October 3rd, 2018|Blog|

Biometrics technologies application for security

Biometrics technologies are nowadays emerging thanks to their potential applications in many different fields. Some examples are represented by the use of the fingerprint for mobile and laptop authentication and similarly, face recognition and iris scanning. Some of the aforementioned applications are very recent while the others are in use from some years. However, [...]

2018-09-28T07:22:18+00:00September 28th, 2018|Blog|

Security transformation

Cyber threats are growing and becoming even more sophisticated in their technologies. It follows that security techniques need to grow and evolve in order to anticipate potential problems: the digital transformation cannot prescind from an increase in data security. For all these reasons, technologies adopted until now to contrast cyber risks can result nowadays to [...]

2018-09-28T07:17:11+00:00September 28th, 2018|Blog|

There is no such thing as a growth industry – and it is not me who says this… ?

The term marketing myopia is also not mine; both the term and the quote above are by Theodore Levitt who wrote what is now considered as a legendary article back in 1960 for the Harvard Business Review. It is all worth that you read the article yourselves, so there is no need from my side [...]

2018-09-28T07:07:33+00:00September 28th, 2018|Blog|

Visualization of System Dependencies using GraphingWiki

Since the second iteration of the workshops in the piloting cities Larissa (GR) and Rome (IT) are coming closer, the preparations are in progress. As briefly explained in Mr. Wills blog post on the 8th of May, these involve the creation of a System Dependency Graph using GraphingWiki. GraphingWiki is an extension of the open [...]

2018-09-14T17:59:28+00:00September 14th, 2018|Blog|

CARIS Research and University of Vienna present CS-AWARE in the IPICS Summer School in Greece

Partners CARIS Research and University of Vienna participated in the Intensive Programme on Information and Communications Security - IPICS2018, that took place on Lesvos island, Greece between 2 and 13 July 2018. IPICS is a Summer School that has been running since 1998 and has been hosted by several European Universities. This year it was [...]

2018-09-27T09:08:17+00:00August 8th, 2018|Blog|
Go to Top