The CIPSEC Project comes to an end: final recap and concluding thoughts

Do you remember those old times, some decades ago, when computers could take a whole room? Do you remember how big they were?
Do you remember those old times, some decades ago, when computers could take a whole room? Do you remember how big they were?
Exploitation as understood in the context of EU-funded projects is the part of the project that deals with the use of the results for commercial purposes or in public policymaking, as the European
For the past couple of years, threat actors have consistently targeted organizations in the energy, utility and other sectors. Cyberattacks on critical infrastructure have become increasingly more complex and more disruptive, causing systems to shut-down, disrupting operations, or simply enabling attackers to remotely control affected systems.
Thousands of security vulnerabilities are discovered every year in software, systems and IT infrastructures. Attackers exploit these vulnerabilities to penetrate the communications networks of organizations and gain access to critical assets for the purpose of harming confidentiality, integrity and availability of data or systems
What does it come to your mind when you hear talking about hackers? Probably your first thoughts focus on breaking passwords and damaging a webpage or a computer. Maybe you think about the idea of stealing bank details in order to make money. You are right, but it is not common to relate cyber-security to healthcare when, actually, it is one of the most important targets of hackers.
Control and safety systems take a central role in the safe operation of trains in European rail networks since a long time.
This post has been written by Markus Heinrich (Technische Universität Darmstadt).
This post has been written by Manos Athanatos.