The National Institute of Standards and Technology has released a Cybersecurity risk reduction framework for businesses in the manufacturing sector. The document outlines a general target profile for manufacturers around to identify risks within their business more efficiently than customizing from a general set of guidelines. If you are in any manner concerned with …
Mathieu Lavoie has a B.Eng. from the École de Technologie Supérieure (E.T.S.). He is a pentester and previously worked as a malware researcher at ESET as well as a computer security freelancer. During his free time, Mathieu is an avid participant of CTFs where he developed a deep love-hate relationship with Crypto Challenges or …
Telecommunications fraud groups, the ones running scams over the telephone are a problem around the world. Taiwan is no exception with a number of related arrests in the past decade. Telecom fraud group. Yi-Chun Chang, Kuan-Ting Lai, Seng-Cho T. Chou and Ming-Syan Chen wanted to learn more about how these fraud groups operate through Social …
Presented at 2017 GoSec, 30 October 2017 Susan Munn has over 35 years of security and business risk management experience in law enforcement, government, and private sectors. She is CEO of her own firm, CompassQ Inc. and also recently named to the Advisory Board for PARM – Proactive Risk Management – an international …
Francesca Bosco – UNICRI, Presented at the 2016 Spring SERENE-RISC Workshop. Advances in the field of global technology have transformed the way in which societies function, affecting governments, businesses, and individuals alike, evoking a wide array of societal benefits, while also subjecting populations to varying degrees of cyber risk. Critical infrastructure serves as …
The sharing of intimate images by digital means is something that has created new issues for Canadians. This is reflected in the creation of laws for non-consensual intimate image sharing or ‘revenge porn’ laws. The issues get murkier when it comes to intimate images and youth as child pornography laws often also apply to the …
Presented at the SERENE-RISC Spring workshop 2016. As anybody who uses a PC has discovered, the “free” software industry is a mess. Customers have become very suspicious of every offer, and use a jaundiced eye to double-check each checkbox and click. Still they make mistakes and end up with unwanted software. This industry now makes …
The Berkman Klein Harmful speech Online project has created a collection of essays that both draw from research and provide opinions to discuss a range of perspectives on this issue of harmful speech online. It provides pieces looking at Framing the Problem, International Perspectives, and Approaches, Interventions, and Solutions. This collection could provide a valuable …
Never mind sophisticated and persistent threats, what about simple and opportunistic ones? Have we closed the door on attacks that require little investment on the part of attackers? In particular, are we still shipping software without the most basic of security policies ? B. Knieriem, X. Zhang, P. Levine, F. Breitinger & I. Baggili surveyed …
From the SERENE-RISC Workshop held in April 2016 in Vancouver, Canada. Social Media Analytics for Intelligence and Security Informatics Christopher Yang – Drexel University In this talk, we’ll discuss some of the social media and data analytics work we have done on the DIBBs data archive. The DIBBS data archive is a 3-year project funded …