We are pleased to inform you that the registration to the EOSC Symposium 2024 is open and a draft programme is available! Therefore, we would like to encourage...
Author - Laetitia Lagneau
This year’s EOSC Symposium, taking place in Berlin from Monday 21 October till Wednesday 23 October 2024, is steadily approaching. Earlier we launched a Call...
We’re delighted to announce the arrival of a brand new Belnet website, marking a significant step forward in our drive to personalise and enhance the...
This year’s EOSC Symposium is steadily approaching, and the work to prepare an interesting, engaging and thought-provoking event programme for you has started...
By Aleksandar Velinov, University Goce Delcev, Štip, Macedonia. Nowadays, organisations face many security challenges. Security is important for computer...
By Panayota Smyrli, Cyber Security Analyst at CYNET-CSIRT and Stephanos Andreou, Security Analyst Let’s explore the most common types of social engineering...
By Louise O’ Sullivan, ICT Security Services Manager at HEAnet; Ireland’s National Education and Research Network In May 2021, Ireland was...
By Guillaume Rousse, IT Security Engineer at GIP RENATER These days, passwords are a universal authentication method, because they are simple to configure on...
By Urpo Kaila, Head of Security at CSC, Finland The password is dead, we have been hearing this for a very long time. ‘You need to use keys, certificates...
By Carolina Fernandez, Jordi Guijarro and Shuaib Siddiqui, i2cat Foundation Introduction of IdP environment in the context of identity security eduGAIN...
Ransomware is used by cyber criminals to block you from accessing your data and hold it ‘hostage’ until you pay the ransom. How does it work and how to avoid...
The CIRT of the Faculty Computer Science of the University of Skopje was founded 2.5 years ago as the result of a cybersecurity exercise which brought to light...
By Sonja Filiposka and Anastas Mishev, respectively head and former head of FINKI CIRT Nowadays phishing attacks are one of the most notorious and dangerous...
Continues from Demystiphying phishing – Part 1 By Damien Mascré, David Verdin, Laurent Aublet-Cuvelier (RENATER) Phishing aims to steal your secrets...
By Damien Mascré, David Verdin, Laurent Aublet-Cuvelier (RENATER) On the list of the many issues inflicted by emails, phishing appears to be social disease:...
By Christine Glaser, Communications and Marketing Manager, Restena Foundation, with the contribution of Jean-Paul Weber, Security Engineer, Restena Foundation ...
By Bruno Vuillemin, Security Officer of the University of Fribourg Sometimes a very simple fraud can cause a great deal of trouble. Whenever you receive and...