"ERCIM White paper on Cyber-security and privacy research"

LUÍS ANTUNES | April 26, 2016

article image
This document describes the main research challenges on security and privacy identified by a group of experts of the European Research Consortium in Informatics and Mathematics (ERCIM).In early 2014, ERCIM launched an initiative to identify the emerging of grand challenges in ICT and define the strategic research topics needed in order to achieve the highest impact results to meet those challenges.

Spotlight

Komputer Kraze

We are committed to keeping your computers running at their fullest potential. Our motto "We Speak Your Language" really means something to us. Many companies can talk to your computer or network, but we can also talk to you, the client. If you are sick of speaking to computer geeks with no personality or ability to express ideas in non-technical language, then contact us. We pride ourselves on being computer experts that are also "normal" people. komputer Kraze proudly serves the Troy, Tipp City, piqua and the rest of Miami County and surrounding counties. with computer services, network consulting and trouble shooting. If you or your business need computer services contact us for the lowest pricing and highest customer satisfaction in the area. Computer services include: Hardware installation, Software installation, Custom built systems, Diagnostics, Computer Repair, Upgrades, Virus removal, IT Technical Support and much much more.

OTHER ARTICLES

A 4 Step Guide to Stronger OT Cybersecurity

Article | April 14, 2020

Security and risk management leaders at organizations around the world are increasingly concerned about cybersecurity threats to their operational technology (OT) networks. A key driver behind this is that cyberthreats, like disruptionware, are increasing in quantity and sophistication all the time. Industrial control system (ICS) networks are categorized as high risk because they are inherently insecure, increasingly so because of expanding integration with the corporate IT network, as well as the rise of remote access for employees and third parties. An example of an IT network within a control system is a PC that’s running HMI or SCADA applications. Because this particular PC wasn’t set up with the initial intention of connecting to IT systems, it typically isn’t managed so can’t access the latest operating system, patches, or antivirus updates. This makes that PC extremely vulnerable to malware attacks. Besides the increased cyberthreat risk, the complexity resulting from IT–OT integration also increases the likelihood of networking and operational issues.

Read More

A COVID-19 Cybersecurity Poll: Securing a Remote Workforce

Article | March 17, 2020

As the coronavirus pandemic continues to sweep the globe, and cities and states impose social-distancing measures, businesses are sending their users home to work. And this massive, unprecedented shift to distance working brings with it a whole new set of cybersecurity challenges. For instance, a lack of IT resources can bite many organizations as they move to enable remote strategies. And when workers and students are sent outside the normal perimeter, managing device sprawl, and patching and securing hundreds of thousands of endpoints, becomes a much a bigger challenge. Threatpost editors wanted to learn more about challenges and best practices from the IT and security professionals on the front lines of this. Please take a few minutes to take the Threatpost poll. The answers will be collected the results will be published in an article later this week.

Read More

CYBERSECURITY AND CORONAVIRUS: KEEPING YOUR BUSINESS SAFE

Article | March 19, 2020

Measures to mitigate the outbreak of COVID-19 have led to an unprecedented increase in remote working across the board. Our guest author Philip Blake, European Regional Director at EC-Council and cybersecurity expert, outlines key challenges and tips for staying secure while away from the office. As governments and businesses work on mitigating the impact of the ongoing COVID-19 outbreak, social distancing measures are leading to an increase in remote working across all sectors. The reasoning behind the measures is best left to health authorities, and are discussed at length elsewhere. The purpose of this article is to shed light on some of the key cybersecurity challenges around the sudden spike in remote work arrangements, and propose potential measures to keep networks as secure as possible during these times.

Read More

Security by Sector: Improving Quality of Data and Decision-Making a Priority for Credit Industry

Article | February 17, 2020

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and risks than others? Do some do a better job of keeping data secure, and if so, how and why?A new study of credit management professionals has revealed that improving the quality of data and decision-making will be a top priority for the credit industry in the next three years. The research, from Equifax Ingnite in collaboration with Coleman Parkes, takes a deep dive into the views of credit management pros across retail, banking, finance and debt management/recovery sectors.

Read More

Spotlight

Komputer Kraze

We are committed to keeping your computers running at their fullest potential. Our motto "We Speak Your Language" really means something to us. Many companies can talk to your computer or network, but we can also talk to you, the client. If you are sick of speaking to computer geeks with no personality or ability to express ideas in non-technical language, then contact us. We pride ourselves on being computer experts that are also "normal" people. komputer Kraze proudly serves the Troy, Tipp City, piqua and the rest of Miami County and surrounding counties. with computer services, network consulting and trouble shooting. If you or your business need computer services contact us for the lowest pricing and highest customer satisfaction in the area. Computer services include: Hardware installation, Software installation, Custom built systems, Diagnostics, Computer Repair, Upgrades, Virus removal, IT Technical Support and much much more.

Events