What is Risk Assessment?

This post intention is to deliver to the readers an introduction to risk assessment. Please bear in mind, that the author is conducting research in this field, therefore in few months there will be more articles about cyber-risk and so forth. Nevertheless, hope that the below will guide you, and ...

more ...



Penetration Testing vs. Vulnerability Assessment

Introduction

In the past few days, months and indeed years many people have approached me and asked me a very simple question… But bare in mind that this simple question was and indeed it is a still a big dilemma between many professionals in IT security, cyber security, management, decision-makers ...

more ...



Introduction course to Cyber Security

YES Incubator in collaboration with CyberSecurity.mk have organized one-day introduction course of cyber security, on 09 of February 2013. Whereby the participants have learned and have been introduced to the terminology, possible most common attacks, vulnerabilities, as well as exploitation of IT systems. In addition, we had a work-shop ...

more ...


Stockholm Internet Forum 2013

This year the Stockholm Internet Forum 2013 was addressing the freedom of Internet, human rights, freedom of speech, censorship, privacy as well as importance of security. Among the topics, also we have touched the cyber security, surveillance, importance of information security coupled with critical information infrastructure and critical infrastructure. Once ...

more ...


Bullying of digital divide or not?

Abstract

The Internet is changing the average citizens as much as did other technologies, for instance: telephone, TV, computers, mobile phones, etc. The main province was to help the science, engineering, and business. Many scholars, technologists, and social critics believe that these changes and the Internet, in particular, are transforming ...

more ...


Cyber Security Group in South Eastern Europe

Recently we have heard and read about the importance of cybersecurity around the US and EU. Firstly Obama administration get order intended to bolster cybersecurity, where the move comes after the White House tried, and indeed failed to get tough cybersecurity legislation through Congresses last year. Secondly, EU released the ...

more ...

Network Security Toolkit

Introduction

A toolkit is a collection of tools, where for our motives is an assembly of tools to eavesdropper and scan network security for the possible exploitations. Moreover, these tools are designed from security researchers and experts, for the purpose of network administrator and security analysts to be able in ...

more ...

ICSAP – Interactive Cyber Security Awareness Program

Abstract

Currently, humans coupled with the socio-technical aspect can be either the strongest or the weakest link in any information security system, and the key in security lies in delivering awareness training through short and effective online videos, whereby the participator can gain knowledge on security. Our aim, therefore, is ...

more ...