The SerIoT project, the result of which is exploited in the IoTAC project, was coordinated by the Institute of Theoretical and Applied Informatics, Polish Academy of Sciences. SerIoT introduced self-awareness into software-defined networking (SDN) through a patented cognitive packet network (CPN) in which the packets route themselves adaptively via SDN…
The workshop will take place in Nice, on 20. Oct 2022, co-located with MASCOTS. Applications are invited for: Full papers (8 pages in CEUR ) on original research, or on lessons learned from detailed research, system implementations or system evaluations, Position papers (6 pages in CEUR format) covering a well-argued…
In its latest report, Trend Micro surveyed 900 cybersecurity leaders in manufacturing, electric utilities, and oil and gas industries from the US, Germany and Japan, in February-March 2022. The key findings: 89% of respondents had manufacturing, and energy supplies affected due to cyberattacks in the last 12 months and the…
Anna Marton, Safepay SystemsAugust 19, 2022
The classical tools and theories of the international political economy and diplomacy were the product of and well suited for the analogue world, where old strategies built on resource scarcity and ‘real’ events with physical objects apply. As transportation was experiencing revolution with cars, roads and highways, becoming mainstream, it…
Rob van Kranenburg, asvinAugust 12, 2022
Global Platform and the ioXt Alliance have signed a Memorandum of Understanding to collaborate on aligning IoT security schemes, help harmonize standards and reduce fragmentation across the cybersecurity industry. “By simplifying security evaluation, and reusing certified components, manufacturers and vendors are provided with assurances that products will be protected and meet…
Anna Marton, Safepay SystemsAugust 5, 2022
Quantitative Security Assessment based on Static Analysis Software security was traditionally treated as an afterthought in the overall development cycle of software products, being introduced after the software product was implemented (or even used) mainly through the inclusion of external protection mechanisms (e.g., intrusion detection and prevention techniques). According to…
Barracuda Networks published its latest report on “The state of industrial security in 2022”. 800 managers responsible for IIoT/OT participated in a global survey fielded in April 2022, from a broad range of industries, in the U.S., Europe, and Australia. 94% of the organizations surveyed experienced a security incident in…
Anna Marton, Safepay SystemsJuly 21, 2022
The rapid rise of cyberattacks of all kinds, particularly ransomware, is pushing companies to expand their defense perimeter by applying a zero-trust approach. But how does it work? And more importantly, how can its effectiveness be calibrated? Often, an organization’s first instinct is to implement zero trust at the network…
Yann Morvan, AtosJuly 15, 2022
The Proceedings of the EuroCybersec 2021 Workshop have been published! This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October 2021, organized by Professor Erol Gelenbe (IITIS-PAN). The 10 selected papers focus on topics of…
Anna Marton, Safepay SystemsJuly 5, 2022
CRITICAL CHALLENGES IN THE INTERNET OF THINGS IoT devices are widely used and the number of such devices is still growing at a very fast pace because of their importance in ”smart everything” applications, especially the smart grid, smart homes, smart vehicles, smart cities, in industry with smart manufacturing known…
Recent Comments