Up
0
Down
Posted in Cybersecurity

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E14)

S1/E14: Bonus Episode – The EU Cybersecurity Resilience Act

Up
0
Down
Posted in Cybersecurity

Defence Against Phishing Attacks

Phishing attacks are a type of cyber attack that involve tricking a victim into divulging sensitive information, such as passwords, usernames, or credit card numbers. There are several different types of phishing attacks, each with its own unique characteristics and methods of operation. In this article, we'll explore the most common types of phishing attacks and how to recognize and avoid them.

Up
0
Down
Posted in Cybersecurity

Buffer overflow attacks and how to defend against them.

A buffer overflow is a type of cyber attack that occurs when a program or system tries to store more data in a buffer than it was designed to handle. This type of attack is often used by hackers to gain unauthorized access to a system, execute malicious code, or crash a system. In this article, we will discuss buffer overflow cyber attacks in detail, including how they work, common attack vectors, and how to prevent them.

What is a Buffer Overflow?

Up
+1
Down
Posted in Cybersecurity

Gas Networks as Targets for Cyber Attackers

Cybersecurity is of utmost importance for gas networks, as they are critical infrastructure systems that can have serious consequences if compromised. Here are some key considerations for cybersecurity in gas networks:

  1. Risk assessment: Gas networks should perform a comprehensive risk assessment to identify all potential vulnerabilities and risks associated with their systems. This should include an evaluation of their hardware, software, and network infrastructure.

Up
0
Down
Posted in Cybersecurity

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E4)

S1/E4: The European Cybersecurity Competence Centre and the Network of National Coordination Centres

As a continuation of our series about EU policies and regulations that heavily impact the art of software design and the businesses of software development and deployment, today we’re going to read about the European Cybersecurity Competence Centre.

Up
0
Down
Posted in Cybersecurity

Cyber-Security Concerns for Industrial Manufacturing

As industries become more reliant on technology and interconnected devices, cyber security has become an increasingly important concern for industrial manufacturing companies. The potential impact of a cyber attack on a manufacturing facility can be significant, including downtime, loss of production, reputational damage, and even physical harm to employees.

Up
0
Down
Posted in Cybersecurity

Attacks Against Energy Systems with Reference to Ukraine

As technology continues to advance, cyber-attacks have become more prevalent, and the targets of such attacks have expanded to include power systems. A power system is a critical infrastructure that provides electricity to homes, businesses, and industries. A successful cyber attack on a power system could result in significant damage to the infrastructure, loss of life, and even economic collapse. In this post, we will discuss the potential consequences of cyber-attacking a power system and ways to prevent such attacks.

Up
+1
Down
Posted in Cybersecurity

Navigating the nexus of EU Policy, Digital Technologies, and Futures (S1/E3)

S1/E3: A little bit of gossip: Am I paranoid or there is indeed someone behind my laptop camera?

 

Up
0
Down
Posted in Cybersecurity

Ensuring Transparent and Intelligible Machine Learning in Manufacturing: Striking the Balance Between Accuracy and Trust

Machine learning models have the potential to transform manufacturing by predicting equipment failures, optimizing production schedules, and identifying bottlenecks. However, to ensure the success of these applications, stakeholders must trust the models and their recommendations. Transparency and intelligibility are vital to building this trust, as they allow users to understand the rationale behind the model's decisions, ensuring that the AI-driven recommendations are reliable and justifiable.

Up
+1
Down
Posted in Cybersecurity

Unbreakable Chains: How AI is Fortifying Cyber Resilience in Supply Chains

Conventional log monitoring solutions rely on manual rule-based analysis, whereas newer AI techniques utilize Natural Language Processing to model log streams and detect normal operating patterns. However, combining the benefits of these dynamic and static monitoring methods can create a powerful automated system capable of identifying anomalous situations and potential security risks without requiring human intervention. In this article we explore the potential benefits of integrating both novel and well-established techniques, in the context of an often conservative domain.

Up
+1
Down
Posted in Cybersecurity

Moving Target Defences

Moving Target Defense (MTD) is a cybersecurity approach that aims to increase the resilience of computer systems and networks by continuously changing the attack surface or defense profile. This approach involves dynamically changing the system's configuration, topology, or behavior to prevent attackers from gaining access, detecting vulnerabilities, or launching successful attacks. The objective of MTD is to make it more difficult and time-consuming for attackers to exploit system weaknesses, thereby reducing the chances of a successful attack.

Up
0
Down
Posted in Cybersecurity

Navigating the nexus of EU Policy, Digital Technologies, and Futures (S1/E2)

S1/E2: The General Data Protection Regulation of the European Union – It’s good to be a EU citizen

Up
0
Down
Posted in Cybersecurity

Cyber-Security for Power Systems

Cybersecurity has become one of the most critical aspects of modern-day technology. With the increasing reliance on technology in power systems, cyber-attacks pose a significant risk to the reliability and security of the power grid. Cybersecurity threats have become more sophisticated and complex, leading to significant damages, including blackouts, financial losses, and theft of sensitive information. Therefore, there is a need to understand the cyber security concerns for power systems to develop effective measures to mitigate cyber-attacks.

Up
0
Down
Posted in Cybersecurity

Cyber-Security Concerns in the Medical Device Domain

Cybersecurity in the medical device industry is a growing concern as technology continues to advance and devices become more interconnected. While medical devices have brought about significant improvements in patient care and outcomes, they are also vulnerable to cyberattacks, which could have severe consequences for patients and healthcare providers alike. In this article, we will explore some of the major cybersecurity concerns in the medical device sector and discuss some potential solutions to address them.

Up
0
Down
Posted in Cybersecurity

Join the Cyberwatching.eu Project Clustering activity now!

The Cyberwatching.eu is pleased to share with you the Project Clustering page, where you could find and collaborate with the existing project clustering  around the cybersecurity and privacy community. Cyberwatching.eu has supported collaboration and mini-clusters between R&I projects focusing on cybersecurity solutions and best practices in vertical sectors and horizontal topics.