News

Home » News
Filter the news and events here. Use CTRL + click for multiple selections and unselections

CCN Webinar on Cyber Ranges

25/06/2020

The Cyber Competence Network (CCN) are looking into engaging European cybersecurity professionals, representatives of national and European public institutions, and representatives of universities. If you are interested in cyber ranges, practical applications, and building cooperation, this webinar is just for you.

The FutureTPM Project in a more visual way

As with any project, dissemination is key to effectively sharing aspects of your efforts with a wide range of audiences. Video is perhaps the most effective medium to encapsulate the projects aims and mission is a concise and brief way. Below are two videos generated by Technikon, the project coordinator of FutureTPM. Watch them both for a quick overview about the project and the use cases.

 

Red Alert Labs, a Specialist in IoT Cybersecurity Strategies, Presents Its Security Certification Offer for IoT Devices

With the rise of the Internet of Things, cyberattacks are becoming more and more aggressive and frequent. They no longer target only critical infrastructures, but also industrial environments, businesses, and the general public.

Connected objects improve productivity and quality of life, but they often present significant vulnerabilities. This leads many users and organizations to fear, among other things, the impacts on the security of their personal and sensitive data, causing a crisis of confidence.

Work in Progress on D3.1

SECONDO researchers, Sakshyam Panda from University of Surrey Alexendra Dritsa and Aristeidis Farao from UPRC work closely at UPRC Laboratory on D3.1 Pricing Methods and Risk Modelling which is going to be delivered at the end of June.

By Steffen Mauer, ATLAS Intelligence GmbH

The invention of email in 1971 has revolutionised human communication. With 293 billion emails sent around the globe every single day in 2019, email is one of the world’s most important forms of human exchange.

Unfortunately, criminals take advantage of the historical weaknesses of the email protocol. Phishing attacks in combination with malware represent the most expensive cybersecurity damages for companies.

FORTIKA: helping businesses to respond to cybersecurity incidents

"The FORTIKA consortium made it possible to develop within 3Y a competitive market-ready cyber-security solution, addressing the needs of modern SMEs, worldwide."

- Dr. Dimitrios Tzovaras, FORTIKA Project Coordinator

Untapped Potential: Women in Cybersecurity

08/06/2020

Cybersecurity is the base-layer of digitalisation. Without it, all efforts of digitally transforming the economy are built on a weak foundation.

Decentralized operation and security in the IoT Space

18/06/2020

Cyberwatching.eu and the SOFIE project are collaborating to organise a 2-hour workshop entitled “Decentralised operation and security in the IoT Space” to be held on 18th June at 11 AM CEST (12 PM EEST). The workshop will be showcasing how decentralized operation and security in the IoT Space help our society and economy.

Cyberwatching.eu June Newsletter: Services, solutions and resources to tackle the COVID-19 cybersecurity threats

The COVID-19 pandemic has forced many SMEs to implement a quick transition to a more digitalised workflow. Cyberwatching.eu provides a number of resources which SMEs could benefit from, particularly in the current situation where cybersecurity skills are more needed than ever.

Pages

News

What are the challenges and (cybersecurity) issues the financial sector is currently facing? 

Future Events

Join our workshop on 30 October 2020 at 10am CET to learn how we are tacking cybersecurity in the financial sector and discuss Regulations, Digital Identity and more.

 

30/10/2020

The Digital Transformation EXPO Manchester (formerly IP EXPO Manchester) is the North's biggest IT event, and it's completely free to attend.

It will offer the opportunity to learn all about the technologies that enable digital transformation: upgrade legacy systems to build modern infrastructure; migrate to a secure public, private or hybrid cloud; detect and prevent cyber attacks; improve business operations with AI and robotic process automation (RPA); collect data for effective analysis. 

04/11/2020 to 05/11/2020