Loading...
Blog2017-11-23T10:08:16+00:00
2807, 2020

Collateral Benefits and Advantages of conducting a PIA/DPIA?

When being faced with the necessity of conducting a privacy impact assessment / data processing impact assessment (PIA/DPIA), the first considerations are usually devoted to the potentially substantial effort involved.However, from an information security point of view, this might also [...]

2207, 2020

The CS-AWARE system and dependency graph

One of the challenges of CS-AWARE was to be able to represent analysis results of socio-technical system and dependency analysis, which is highly depended on the individual organization that is analysed, in a structured and machine readable form so that [...]

2107, 2020

Greeks are vulnerable to internet threats

It is difficult to underestimate the importance and role of the Internet in modern relationships - keeping in touch with friends and acquaintances, family friends or looking for romantic partners. While a whole new world of possibilities has opened up, [...]

2007, 2020

COVID-19: The new reality in cybersecurity

Most companies do not have adequate security systems to support remote work and now have to face the new reality of COVID-19, which includes a wider range of attacks and less secure devices. Many companies also had to quickly adapt [...]

2007, 2020

The Dutch Situation: where is the awareness?

In line with the national “Digital Agenda 2020” Dutch municipalities, organised in the VNG (Association of Dutch Municipalities) aim for a common approach for implementing ICT services. This had resulted in the objective by VNG for a common municipal digital [...]

1007, 2020

Municipalities: A new Eldorado for cybercriminals?

Our society is dependable of information networks. Cyberattacks against cities and municipalities have come alarmingly everyday incidents. In USA there were more 100 ransomware attacks against public administrations (schools and local governments)1. The cost of a single attack can be [...]