About CSAwareAdm

This author has not yet filled in any details.
So far CSAwareAdm has created 155 blog entries.

Cyber Security in Public Administration

The rapid and high-speed development of services in the "cyber-space", on the one hand, has innumerable advantages, such as the breaking down of geographical borders, through the interconnection of billions of people, the delivery of new types of services and the global level exchange of knowledge. On the other hand, it is the source of [...]

By |2018-03-02T14:39:30+00:00March 2nd, 2018|Blog|0 Comments

Working with municipalities about innovative technology

Our company has more than 20 years of experience of working with with new technologies, at first in educational contexts. There was a period when schools liked new approaches to learning they thought interactive technology would afford. What we, and the school, forgot, was that there was not much interaction in their curriculum, so we [...]

By |2018-02-22T14:07:51+00:00February 22nd, 2018|Blog|0 Comments

New Tools for the Establishment of a Stronger Cyber-Security Framework in the EU

The European Commission presented a couple of moths back its proposals on cybercrime in the EU, suggesting at the same time the establishment of an EU Cyber ​​Security Agency, to be incorporated into the existing EU Network and Information Security Agency (ENISA) based in Heraklion, Crete. With digital technologies being the backbone of the European [...]

By |2018-02-20T14:31:54+00:00February 16th, 2018|Blog|0 Comments

The Benefits of Cyberthreat Information Exchange

Cyberattacks have attracted interest due to both the frequency that successful attacks occur at, as well as the strong impact they may have on organisations. In response to this, the security industry developed a variety of products and solutions providing security event management and incident response. These products rely on gathering and analysing a broad [...]

By |2018-02-16T10:04:52+00:00February 16th, 2018|Blog|0 Comments

Systems and Dependency Analysis of the systems of the cities of Larissa and Rome

We’ve just put the finishing touches to the first iteration of the Systems and Dependency Analysis of the systems of the cities of Larissa and Rome. This is being done in order to establish some Cybersecurity requirements for local public administrations. The report was passed to the internal review team last week and will be [...]

By |2018-02-14T13:13:58+00:00February 14th, 2018|Blog|0 Comments

Barriers to achieving higher levels of cybersecurity in Local Government

The 2016 Cybersecurity  survey[1] of local government chief information officers revealed that the general inability in local government to offer competitive salaries, combined with a lack of cybersecurity staff, and a recurring lack of funds  have prevented local governments from achieving higher levels of cybersecurity[2]. Almost a third (32%) of the respondents reported an increase [...]

By |2018-02-14T13:13:05+00:00February 13th, 2018|Blog|0 Comments

My general opinion about cybersecurity

In my opinion cyber-security is all the organized actions required to protect information from any risk in all its forms (digital, physical). Ensure the systems and networks which store, retrieve , process and transport the information. Including measures to protect from criminal acts, sabotage, espionage, accidents, and failures. We should also consider as Cyber-Security threats [...]

By |2018-01-09T19:38:38+00:00January 9th, 2018|Blog|0 Comments

Introducing the Concept of CS-AWARE to Greek Public Organizations

Dissemination actions are more than essential for the sustainability, scalability and successful course of an ambitious project. In the case of CS-AWARE early dissemination becomes a necessity, considering the pan-European nature and character of the applied research, currently implemented. So, when an opportunity arose to present the concept of CS-AWARE to a large number of [...]

By |2018-01-08T21:36:28+00:00January 8th, 2018|Blog|0 Comments

GDPR: the centrality of data security in the digital era

The entrance in force of the GDPR set new challenges and opportunities for Europe-based companies. In particular, the new regulation puts cyber security under the spotlight as a fundamental requirement to guarantee data protection. Indeed, as the digital revolution has paved the way to international businesses and new market ventures, so has also increased [...]

By |2018-11-14T13:59:37+00:00January 5th, 2018|Blog|0 Comments

Bringing the information out of the information

When faced with an enormous amount of data, in our case, Cyber Security related data, it is easy to miss the real points. Current available systems are very good at pinpointing single or even common occurrences of for instance intrusion attempts, DDOS-attacks etc., but usually fail to give the overview to those in need, in [...]

By |2018-01-03T14:21:09+00:00December 29th, 2017|Blog|0 Comments