In 2023, the Awareness subtask team, within the GN5-1 Security Work Package 8, Task 2 Human Factor (WP8 T2), conducted a survey on the status of cybersecurity...
Author - Davina Luyten
By Urpo Kaila, Head of Security at CSC Security is a thriving and exciting field, but security breaches can contain nasty elements too. Compromised accounts...
By Panayiota Smyrli, Cyber Security Analyst at CYNET-CSIRT In today’s smart, connected, and increasingly automated landscape in which organisations operate...
By João Machado, Cybersecurity Analyst at RCTS CERT In the digital age, cybersecurity is a top priority for any organisation. It’s crucial to understand the...
By Rosanne Pouw, Product Manager Awareness and Training at SURF Phishing and ransomware are the most common cybersecurity threats for the research and...
Can ChatGPT be tricked into helping cyber criminals? Would you be suspicious if your boss called you and asked you to share sensitive information? And what...
Think of Brazil, and it’s probably Carnival, lush rainforest, or football legends that first come to mind, rather than cybersecurity. But in Brazil, as...
Do you have to follow a conventional path into working in cybersecurity? How useful are internships really? And how can we tackle the dangers of shadow IT...
Next week we will kick-off our large-scale awareness campaign “Become a Cyber Hero”! This year the programme includes brand new materials for Research &...
Kristiaan De Greve is Programme Director of quantum computing at IMEC, Associate Professor at the Faculty of Engineering Science at KU Leuven and visiting...
By Louise Altvater, Security Analyst at FCCN 7:45 a.m. – Get up When I go to the office – which is not every day since we have adopted a hybrid working system...
There are three things that will require your focus when establishing security and privacy arrangements within your institution: technology, awareness and...
There are three things that will require your focus when establishing security and privacy arrangements within your institution: technology, awareness and...
By Luigi Rebuffi, General Secretary and founder of ECSO (European Cyber Security Organization) For several years, ECSO has been developing the cybersecurity...
By Andrea Pinzani, IT Security expert at Consortium GARR More and more people work and study remotely, as employees and students connect to public Wi-Fi at...
There are three things that will require your focus when establishing security and privacy arrangements within your institution: technology, awareness and...
By Ecaterina Matenco, Cybersecurity Officer at the Research and Educational Networking Association of Moldova (RENAM) In the last year, RENAM, the national...
There are three things that will require your focus when establishing security and privacy arrangements within your institution: technology, awareness and...
By Maria Sole Scollo, IT Security expert at Consortium GARR With the introduction of digital COVID certificates, as a consequence to the spread of Covid-19, a...
By Nil Ortiz, Carolina Fernández, Jordi Guijarro and Shuaib Siddiqui, i2CAT Identity types We tend to have multiple identities on the Internet: from social...