Loading...
Blog2017-11-23T10:08:16+00:00
2007, 2018

Cyber security, risk management and policies

Nowadays, organisations, ranging from banks and government agencies to SMEs, depend heavily on the management of risks in order to preserve their existence, operation and profitability. This appears to be undeniable since risks exist in various forms, such as information [...]

1107, 2018

Cyber Security Summit 2018

I spent a very informative and useful networking day at the Cyber Security Summit in London last week. The presentations from the day can be found here.Chris WillsCARIS Research

606, 2018

Some cybersecurity at the DGO conference

The Digital Government Society organised the 19th Annual International Conference on Digital Government Research – dg.o 2018, with a theme: “Governance in the data age“. The dg.o 2018 conference was hosted by Delft University of Technology, Delft, the Netherlands from [...]

406, 2018

Technology, business and markets

It usually all starts with an idea. As it is commonly said, the idea is king or the idea is the king and other clichés.Then it comes to the technology (Step 1): how one gives flesh and bones to an [...]

2905, 2018

Cybersecurity in the EU & the NIS Directive

Whilst everyone in the European Union was leaving the last couple of weeks the frantic rhythms of preparation for the adaptation of the GDPR (May 25, 2018), another crucial EU legislation was getting into effect, regarding cybersecurity. Specifically, by the [...]

2305, 2018

Big-Data v.s. Denial-of-service

Denial-of-service (DoS) attacks and evermore distributed Dos (DDos) attacks are serious threats since they can easily bring down an IT infrastructure causing huge revenue loses. Currently, traditional anti-DDos solutions represents an conspicuous cost mainly for small and medium size companies. [...]

2105, 2018

Data Collection Challenges

3rdplace is currently developing an in-house solution to collect data from local municipalities and security is the forefront; especially because within cs-aware we are dealing with databases of sensitive information.Alongside the most common security vulnerabilities such as SQL Injections (SQLi), [...]