21 September 2021, 13:00-14:30 CET This informal meeting is designed as a space to share and discuss the biggest every day challenges in privacy and security...
Tag - cyber security
We are excited to announce our new programme of webinars for the Cybersecurity Month 2021 (CSM2021) initiative that will take place throughout October. This...
8 September 2021, 13:00-14:30 CEST The EU has announced new legislation under the title of EU Security Union. There are a number of reasons for this...
October 2021 will be Cyber Security Month. Also this year GÉANT will launch a campaign to raise cybersecurity awareness within the R&E community. After the...
With online commerce on a steep rise, the potential for luring customers through false online shops is also growing. Now, however, Switzerland’s national...
Security Day 2021 took place online on Monday 14 June, launching the series of TNC21 side meetings! Around 85 attendees joined a full day of discussions...
24 February 2021, 13:00-14:30 CET This informal meeting is designed as a space to share and discuss the biggest every day challenges tackled by the GÉANT...
CONNECT meets Alf Moens, Security Lead for GÉANT to talk about the European Commission’s revised Directive on Security of Network and Information Systems (NIS2...
Become A Cyber Hero, the first pan-European campaign organised by the GÉANT community, as part of the European Cyber Security Month 2020 activities, closed...
During Cyber Security Month 2020 CONNECT met Henry Hughes, Security Director for Jisc to talk about opportunities and challenges faced by Research &...
By Jon Hunt, cyber services delivery manager at Jisc Criminals always find a way to take advantage of disasters. In the case of COVID-19, there has been...
Cyber-attacks were a key feature of the 2008 Russo-Georgian war; they affected websites of news agencies, the Georgian President and were implicated in the...
By Guillaume Rousse, IT Security Engineer at GIP RENATER These days, passwords are a universal authentication method, because they are simple to configure on...
The primary objective of the LITNET CERT, the Computer Emergency Response Team of the LITNET networks is to tackle security incidents, but it is also fully...
By Urpo Kaila, Head of Security at CSC, Finland The password is dead, we have been hearing this for a very long time. ‘You need to use keys, certificates...
By Carolina Fernandez, Jordi Guijarro and Shuaib Siddiqui, i2cat Foundation Introduction of IdP environment in the context of identity security eduGAIN...
To be effective, passwords need to be long, complicated and unique. It’s also a good idea to have a separate password for every account. But don’t worry...
By Michele Scalas, Davide Maiorca and Giorgio Giacinto, University of Cagliari Ransomware represents a serious threat that acts by locking the compromised...
By Leonardo Lanzi, coordinator of the GARR CERT Once upon a time… In March 2016, I had the chance to be near enough a ransomware infection to be able to...
By Francesco Palmieri, professor of Computer Science at the University of Salerno Ransomware, considered today an important emergency from the cyber security...



















