Up
0
Down
Posted in Cybersecurity

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E14)

S1/E14: Bonus Episode – The EU Cybersecurity Resilience Act

Up
0
Down
Posted in Cybersecurity

Defence Against Phishing Attacks

Phishing attacks are a type of cyber attack that involve tricking a victim into divulging sensitive information, such as passwords, usernames, or credit card numbers. There are several different types of phishing attacks, each with its own unique characteristics and methods of operation. In this article, we'll explore the most common types of phishing attacks and how to recognize and avoid them.

Up
0
Down
Posted in Cybersecurity

Buffer overflow attacks and how to defend against them.

A buffer overflow is a type of cyber attack that occurs when a program or system tries to store more data in a buffer than it was designed to handle. This type of attack is often used by hackers to gain unauthorized access to a system, execute malicious code, or crash a system. In this article, we will discuss buffer overflow cyber attacks in detail, including how they work, common attack vectors, and how to prevent them.

What is a Buffer Overflow?

Up
+1
Down
Posted in Cybersecurity

Gas Networks as Targets for Cyber Attackers

Cybersecurity is of utmost importance for gas networks, as they are critical infrastructure systems that can have serious consequences if compromised. Here are some key considerations for cybersecurity in gas networks:

  1. Risk assessment: Gas networks should perform a comprehensive risk assessment to identify all potential vulnerabilities and risks associated with their systems. This should include an evaluation of their hardware, software, and network infrastructure.

Up
0
Down
Posted in Cybersecurity

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E4)

S1/E4: The European Cybersecurity Competence Centre and the Network of National Coordination Centres

As a continuation of our series about EU policies and regulations that heavily impact the art of software design and the businesses of software development and deployment, today we’re going to read about the European Cybersecurity Competence Centre.

Up
0
Down
Posted in Cybersecurity

Cyber-Security Concerns for Industrial Manufacturing

As industries become more reliant on technology and interconnected devices, cyber security has become an increasingly important concern for industrial manufacturing companies. The potential impact of a cyber attack on a manufacturing facility can be significant, including downtime, loss of production, reputational damage, and even physical harm to employees.

Up
0
Down
Posted in Cybersecurity

Attacks Against Energy Systems with Reference to Ukraine

As technology continues to advance, cyber-attacks have become more prevalent, and the targets of such attacks have expanded to include power systems. A power system is a critical infrastructure that provides electricity to homes, businesses, and industries. A successful cyber attack on a power system could result in significant damage to the infrastructure, loss of life, and even economic collapse. In this post, we will discuss the potential consequences of cyber-attacking a power system and ways to prevent such attacks.

Up
+1
Down
Posted in Cybersecurity

Navigating the nexus of EU Policy, Digital Technologies, and Futures (S1/E3)

S1/E3: A little bit of gossip: Am I paranoid or there is indeed someone behind my laptop camera?

 

Up
0
Down
Posted in Cybersecurity

Ensuring Transparent and Intelligible Machine Learning in Manufacturing: Striking the Balance Between Accuracy and Trust

Machine learning models have the potential to transform manufacturing by predicting equipment failures, optimizing production schedules, and identifying bottlenecks. However, to ensure the success of these applications, stakeholders must trust the models and their recommendations. Transparency and intelligibility are vital to building this trust, as they allow users to understand the rationale behind the model's decisions, ensuring that the AI-driven recommendations are reliable and justifiable.

Up
+1
Down
Posted in Cybersecurity

Unbreakable Chains: How AI is Fortifying Cyber Resilience in Supply Chains

Conventional log monitoring solutions rely on manual rule-based analysis, whereas newer AI techniques utilize Natural Language Processing to model log streams and detect normal operating patterns. However, combining the benefits of these dynamic and static monitoring methods can create a powerful automated system capable of identifying anomalous situations and potential security risks without requiring human intervention. In this article we explore the potential benefits of integrating both novel and well-established techniques, in the context of an often conservative domain.

Subscribe to Cybersecurity