About CSAwareAdm

This author has not yet filled in any details.
So far CSAwareAdm has created 155 blog entries.

LGA (Local Government Association in the UK) and Cyber resilience funded programme 2019/20

Much has been said about smaller municipalities and their lack of resources and qualified cybersecurity staff but little about what to do about the problem of helping smaller municipalities. In the UK the Government, as part of the “National Cyber Security Strategy (2016-2021), awarded the LGA funding from the Cabinet Office to make certain that [...]

By |2020-07-17T08:42:07+00:00July 2nd, 2020|Blog|0 Comments

Flourishing Cyber Industry

As an industry, Cybersecurity is flourishing but local and regional governments are suffering due to a lack of resources and qualified staff. Increasingly it’s more difficult for the public sector to attract staff and pay competitive salaries.Cyber attacks are increasing as time goes on. As time goes on local governments are increasingly more dependent on [...]

By |2020-07-17T08:29:09+00:00July 2nd, 2020|Blog|0 Comments

The EU reviews cybersecurity legislation

Until the end of 2020The Network and Information Systems Directive, i.e. the main European cybersecurity legislation, will be revised by the end of 2020 by the European Union. This was announced by the European Commission, presenting the new strategy of the EU. for the "Security Union" for the period 2020-2025.The Commission emphasizes that cyberattacks have [...]

By |2020-10-12T11:21:37+00:00June 29th, 2020|Blog|0 Comments

Verizon Data Breach Investigations Report 2020

Recently Verizon announced its Data Breach Investigations Report for the year 2020, which includes sixteen different industries and four world regions. A total of 32,002 security incidents were analysed, of which 3,950 were confirmed breaches. According to the findings 45% of the breaches featured hacking, while only 17% of the breaches involved malware. As far [...]

By |2020-10-12T10:25:50+00:00June 12th, 2020|Blog|0 Comments

Cybersecurity: Preparedness Practices

Although cybersecurity is one of the biggest challenges of the digital age that is constantly evolving at an extremely fast pace, it also holds great opportunities. The challenges and best practices that organizations must impose to build a cyber-readiness culture to meet the demands of the new reality were at the heart of the digital [...]

By |2020-10-12T11:18:49+00:00June 1st, 2020|Blog|0 Comments

ESET’s threat report on the first quarter of 2020

According to ESET, in the first quarter of 2020, the threats from malicious Cryptominers and Android malware decreased, while on the contrary, the online threats increased. Developments in the first quarter were apparently determined by the Covid-19 pandemic. In order to take advantage of the sweeping changes in people's daily lives and the operation [...]

By |2020-06-16T16:43:38+00:00May 20th, 2020|Blog|0 Comments

The most common malware in Greece in April 2020

Check Point Research, the research department of Check Point Software Technologies, has published its latest Global Threat Catalog for April 2020. The research team reports that a new version of AgentTesla remote access trojan (RAT) is being distributed through related spam campaigns regarding the new corona virus. This malware was ranked third on the [...]

By |2020-06-16T16:43:57+00:00May 20th, 2020|Blog|0 Comments

COVID-19 impact on CS-AWARE

As Europe is slowly preparing to lift some of the COVID-19 restrictions, we thought it is time so share some of our experiences of European project work in the current lock-down situation. While some or most of the experiences apply to European and national research projects we are participating, this blog is exploring mainly the [...]

By |2020-06-16T16:52:51+00:00May 11th, 2020|Blog|0 Comments

Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem

Computers Journal, vol 9(1), 2020, article number 18 IThreat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security analysis, threat intelligence helps reduce the time between the detection of an [...]

By |2020-03-22T07:15:44+00:00March 22nd, 2020|Papers|0 Comments

Teleworking and cybersecurity during the COVID-19 pandemic

The COVID-19 pandemic created an increased need for remote working, not only for the system administrators, but also for the vast majority of the employees. Several technological solutions were extensively employed, one of which being the Virtual Private Network (VPN). This allowed employees to securely connect to their organisation’s internal network and carry out their [...]

By |2020-10-12T10:11:45+00:00March 12th, 2020|Blog|0 Comments