By Henry Hughes, Director of Security at Jisc For more than two years, Jisc has been supporting the sector to deal with a sustained increase in ransomware...
Author - Davina Luyten

By Steve Kennett, CISO at Jisc Recently, the UK’s National Cyber Security Centre (NCSC) and Information Commissioner’s Office (ICO) have warned against paying...
By the Advanced Computing Group of the Institute of Physics of Cantabria (IFCA) (CSIC-UC) The implementation of the ISO27001 standard establishes the necessary...
by Dr John Chapman, Head of Janet policy and strategy A new UK government report highlights that senior leadership teams don’t always take cyber security...
Why Belnet created a ransomware response plan Attacks involving ransomware have been on the rise for some time. Research by Check Point Research shows that in...
In October GÉANT will launch a large-scale campaign to raise cybersecurity awareness within the international Research & Education community. Following the...
By Urpo Kaila, Head of Security at CSC The clear line between work and our own time disappeared a long time ago. Only few of us keep work related matters in a...
By Gorazd Božič, head of SI-CERT One of the measures that protects us against malicious code is digital code signing. If the operating system cannot find the...
By Damiano Verzulli – GARRLab founder In our daily life, defining and implementing proper “data protection” is always a priority. It doesn’t really matter...
By Dustin Gawron, Martin Waleczek and Vanessa Weidler, EDUCV | Read Part 1 of this blog here Administrators’ Troubles At the beginning of the pandemic...
By Dustin Gawron, Martin Waleczek and Vanessa Weidler, EDUCV Introduction Business communication has considerably changed in the past few years and in many...
By Andrea Pinzani, GARR-CERT Remote-working: digital identities are at risk! Due to the pandemic, homeworking has become a thing all around the world. This...
By Pieter du Plooy, Manager of ICT Infrastructure at Sol Plaatje University With the modern-day enterprise/organisation, we need to connect our users in a...
By Tommaso Rescio, Francesca Soro, Giulia Milan – Centro SmartData@PoliTO – Politecnico di Torino The measures adopted to reduce the spread of the...
By Prof. Oliver Popov, Department of Computer and Systems Sciences, Stockholm University In 2008, Poland and Sweden recognised the need for a forum for wider...
By Prof. Marijke Coetzee, University of Johannesburg Ransomware is on the rise. In the USA, it is estimated that around 65,000 successful breaches occurred in...
By Nil Ortiz, Carolina Fernández, Jordi Guijarro and Shuaib Siddiqui, i2CAT Knowing about our public identity Our identity is scattered along a myriad of sites...
By Leonardo Lanzi, coordinator of the GARR-CERT Hi, probably you’re reading this while connected to your home wireless network and you already followed...
By Joeri de Ruiter, Technical Product Manager at SURF Nowadays, wherever you go it is likely that there is free wifi on offer. This can be very convenient when...
Whether you play chess, Taboo or Tomb Raider, games are entertaining and hold the attention. For a moment in time, the world of the game becomes reality, and...



















