The ASOC project aims to investigate rapid and automated information exchange of security information, IOCs, rules, SOAR workflows, use cases, playbooks and...
Tag - cyber security
We are happy to announce the unveiling of the full programme for Security Days, GÉANT first security conference that will take place in Prague on 9-11 April...
Words: Zoë Fischer, Information Security Graduate, GÉANT In early December, I had the opportunity to attend the 2023 edition of CLAW, the crisis management...
The EU Network and Information Systems Security directive (NIS2), which earlier on this year replaced the NIS1 directive, broadens its scope to include more...
24 November 2022, 13:00-14:30 CET SCION (Scalability, Control, and Isolation On Next-Generation Networks) is a next-generation Internet architecture already in...
Words by Rosanna Norman, Communications Officer at GÉANT Defend as one: sharing intelligence capabilities, tools and services The Jisc Security Conference took...
The main objective of CSM22 was to increase knowledge and awareness of cybersecurity in the broad international R&E community by providing its members and...
By Louise Altvater, Security Analyst at FCCN 7:45 a.m. – Get up When I go to the office – which is not every day since we have adopted a hybrid working system...
CONNECT meets Charlie van Genuchten, Product Manager Security from SURF to talk about CLAW, the Crisis Management workshop for the GÉANT community. Launched in...
By Joost Gadellaa, student of Business Informatics at Utrecht University and research intern at SURF In Research & Education, scientists and educators get...
There are three things that will require your focus when establishing security and privacy arrangements within your institution: technology, awareness and...
By Aleksandar Velinov, University Goce Delcev, Štip, Macedonia What is ransomware? Ransomware is a type of malware (not a computer virus) that can disable...
There are three things that will require your focus when establishing security and privacy arrangements within your institution: technology, awareness and...
By Luigi Rebuffi, General Secretary and founder of ECSO (European Cyber Security Organization) For several years, ECSO has been developing the cybersecurity...
By Andrea Pinzani, IT Security expert at Consortium GARR More and more people work and study remotely, as employees and students connect to public Wi-Fi at...
There are three things that will require your focus when establishing security and privacy arrangements within your institution: technology, awareness and...
By Ecaterina Matenco, Cybersecurity Officer at the Research and Educational Networking Association of Moldova (RENAM) In the last year, RENAM, the national...
There are three things that will require your focus when establishing security and privacy arrangements within your institution: technology, awareness and...
By Maria Sole Scollo, IT Security expert at Consortium GARR With the introduction of digital COVID certificates, as a consequence to the spread of Covid-19, a...
By Nil Ortiz, Carolina Fernández, Jordi Guijarro and Shuaib Siddiqui, i2CAT Identity types We tend to have multiple identities on the Internet: from social...