Loading...

Cyber security, risk management and policies

Nowadays, organisations, ranging from banks and government agencies to SMEs, depend heavily on the management of risks in order to preserve their existence, operation and profitability. This appears to be undeniable since risks exist in various forms, such as information security, compliance, reputational and outsourcing risks. If those risks are not identified, assessed and mitigated [...]

2018-05-17T12:33:14+00:00May 17th, 2018|Blog|

Cybersecurity: You cannot neglect protecting essential services

Who is to blame if your facilities are attacked via network connections? Spring 2017 a global ransomware attack, WannaCry Ransomware, got lot of attention hitting companies, organizations and individual persons. Estimations of its impact were varying but numbers revealed claim that it infected more than 230,000+ computers in 150 countries. A shocking part of the [...]

2018-05-08T18:39:57+00:00May 8th, 2018|Blog|

Planning for the second iteration of the analysis of the pilot scenarios

Working in Vienna for a couple to days this week to plan for the second iteration of the analysis of the pilot scenarios. The second iteration will create and validate the representation of the dependency analysis using the PROTOS-MATINE GraphingWiki. Chris Wills CARIS Research Ltd.

2018-05-08T18:46:04+00:00May 8th, 2018|Blog|

Controlling human behaviour in information security

Some will argue the perspective that human nature is complex by default. Behaviour is a state which can be influenced by numerous factors such as experience, emotions, family and friends, regulations, personal life and the list goes on. Therefore, a question arises: how can we control human behaviour in information security? Everything is a matter [...]

2018-10-03T09:14:41+00:00April 27th, 2018|Blog|

The growing importance of cyber security

New technologies are increasing our attack surface: Machine Learning, devices of the Internet of Things and Blockchain pervade the current technological context. Today there are opportunities unthinkable until a few years ago that open up new innovative scenarios. The downside is that we must confront an increasingly aggressive and sophisticated cybernetic threat.Training on new technologies [...]

2018-04-20T09:18:35+00:00April 20th, 2018|Blog|

Everything but … the framework

I think I ‘met’ first time the term ‘framework’ in my first years of my professional ‘career’. Anything that was too vague to be of immediate practical use, too general to be regarded as a methodology (or a method), something that might be offering insights to different perspectives (or ‘planes’) of a problem, something that [...]

2018-04-07T08:30:49+00:00April 7th, 2018|Blog|

The challenge of the Internet of Systems

The most demanding challenge for cyber security in the digital transformation of enterprises, public institutions and citizens is nowadays represented by the  integration of different systems, which must work together to offer new services and open new market channels. Indeed, the focus is shifting from the internet of things (ioT)  and the internet of [...]

2018-11-14T14:06:09+00:00April 6th, 2018|Blog|

Cyber threats in the Financial Industry

A report done by PwC in 2014 in cooperation with BBA (British Banking Association) highlights very interesting aspects and challenges of the financial and banking industry that are highly relevant for our CS-AWARE project: Malicious actors identified •       Hacktivists – looking to provoke maximum disruption and embarrassment o       Favoured techniques: SQL injection [...]

2018-03-20T14:22:42+00:00March 19th, 2018|Blog|

Designing the CS-AWARE Framework

The final CS-AWARE solution is a combination of a generalized model of interconnected technologies, the framework, and their individualised implementation at a local public administration (LPA). In Software Architecture Design frameworks build the foundation for such structures of components, as Pree (1994) states frameworks are 'reusable semi-finished architectures for various application domains'. While the main [...]

2018-03-13T12:44:13+00:00March 13th, 2018|Blog|

The value of good design (part 1)

The value of a good user interface is indisputable: with a good user interface, all features and functionality are supported; with a ‘bad’ or a ‘poor’ one, the users will ignore your product and will punish you to stay off market.I remember how Donald Norman’s book on ‘The Design of Everyday Things’ that I read [...]

2018-03-02T14:58:37+00:00March 2nd, 2018|Blog|
Go to Top