October is over, and this means one thing: it’s time to review our Cybersecurity Month 2024 campaign (CSM24). Let’s take stock of the collaborative efforts...
Tag - CSM24
On 29-30 October I had the pleasure of participating in the ‘Fortifying Defences – Cybersecurity Initiatives & Blue Teaming Strategies’...
World events and the rise of cyber threats to global critical infrastructure, combined with the increasing awareness and growing number of security-related...
No two networks are alike, and a one-size-fits-all approach to Distributed Denial of Service (DDoS) attack mitigation is not adequate for most DDoS attacks...
Words: Urpo Kaila, Head of Security Policies, CSC, Finland After a quarter century of hectic yet fascinating work in hands-on information security, I am...
By Enrico Venuto, CISO, Politecnico di Torino In recent years, with the strengthening of telecommunications networks and the widespread diffusion of...
How would your institution respond if a seemingly ordinary system check uncovered a major security incident? That’s exactly what the University of Rijeka faced...
What does secure and ethical use of AI look like in practice in higher education and research? Marlon Domingus, data protection officer and AI lead at Erasmus...
How do you prepare students to not just navigate but shape the digital landscape in a meaningful and responsible way? At the University of Zurich, the Digital...
Zero Trust Networking is an aspirational goal for organisations looking to reduce risk and the impact of breaches. It is also an important compliance...
World events and the rise of cyber threats to global critical infrastructure, combined with the increasing awareness and growing number of security-related...
How can universities embrace AI-driven innovation while safeguarding privacy, data security, and strategic autonomy? As artificial intelligence (AI) continues...
How can stretched university IT teams strengthen security awareness against a barrage of increasingly sophisticated cyber threats while also supporting...
By João Machado, Cybersecurity Analyst at the Foundation for Science and Technology (FCT), in the digital services unit FCCN Phishing is one of the most...
By Olga Spillane, Security Analyst at HEAnet The digital job hunt may be convenient, but it also harbours hidden dangers. Cunning scammers, armed with cutting...
From cyberbullying and privacy concerns to malicious content and online predators, today’s digital world presents significant challenges to children and...
By Salvatore Todaro, Head of the Cybersecurity operational unit at the University of Messina Often, when you don’t adequately protect your systems, install...
What do Komodo dragons, COVID-19 protein structures, and ancient papyrus scrolls from Pompeii have in common? They’ve all been subjects of research at Diamond...
By Carlo Volpe, Head of Communications at GARR From the frontiers of AI to collaboration with public institutions and companies: here’s how the world of...
24 October 2024 – 15:00 – 16:00 CEST | Speakers: Andy Roebuck (GÉANT) and Floortje Jorna (SURF) Artificial intelligence isn’t a new concept: It’s...