Threat predictions for 2020
Increase in complexity and sophistication as well as more targeted attacks are expected in the upcoming 12 months based on cyber crime activity of the past year, according to various resources that have conducted research over the subject. Advancements in [...]
AI or not AI; that’s the question
The National Institute of Standards and Technology have had plans to move to a vulnerability scoring method that uses IBM’s Watson artificial intelligence system by October 2019. So far, Watson stumbled when evaluating new and complex vulnerabilities. AI is [...]
Interoperability challenges of cyberthreat intelligence
Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security analysis, threat intelligence helps reduce the time [...]
Cyber Security Act Regulation: An Italian Perspective
One year after the Network and Information Security Directive, the European Parliament and the Council adopted the Cyber Security Act Regulation. The two acts, together with the GDPR, constitute the pan-European digital security system, according to an article signed [...]
Unwanted cybersecurity!
Being the CEO of a small Danish company that works internationally, I cannot avoid being abroad while some bank transactions are due. Recently, while taking part in a workshop at one of our pilot municipalities in the EU, I had [...]
Governments need to fund adequately their innovation efforts
While the Government here in Italy has announced various changes and plans to reorganize the cybersecurity effort on a national level, it is not clear the practical effect of these proposals. Recently the organization of a new ministry for technological [...]
System and dependency analysis workshop in Larissa and Rome – The difference in conducting analysis in a mid-sized and a large municipality
In a previous blog post we discussed the third round of system and dependency analysis workshops conducted in the context of the CS-AWARE project in the municipalities of Larissa and Rome. In this post we would like to discuss in [...]
The best training is … no training (or the value of building intuitive systems like ours!)
Some weeks before, in that period that Germans call “Sommerloch” (good question how to translate this in English: something like a summer gap might make sense…) we had the opportunity to look to some other projects, and how they support [...]
Vulnerabilities in organisations websites
Many web sites and electronic infrastructures of organisations have various security vulnerabilities and are subject to cyberattacks with significant consequences on organisations. Successful cyberattacks lead to consequences which have a direct impact on organisations’ infrastructure, leading to Malfunction of the [...]