Euvgeny Naumov Delve Labs presented at the SERENE-RISC Workshop in 2017 The rapid rise in the number and ubiquity of internet services and internet-facing devices has increased pressure to automate cybersecurity monitoring. However, vulnerabilities discovered by automated solutions per scan can number in the thousands and beyond, still placing a considerable burden on security teams …
Consumer fraud costs Australians $1.4b every year with the advances in technology allowing the victimization of an increasing number of people. Penny Joyna from the Australian Institute of Criminology looks into the relationship between Age and the risk of consumer fraud. Age has long been seen as a factor in the risk of becoming a …
In this video, Prof. Jeremy Clark defines what bitcoin is, how it is used and its relation to cybercrime. This talk was presented in Toronto on May 31, 2016, at the SERENE-RISC Tutorial “Examining Cybercrime 2: Financial Edition”. Jeremy takes something mystical and clearly explains it. There’s this data structure which you may have heard …
DARPA held their cyber grand challenge in Las Vegas last week. The challenge pitted 7 autonomous security systems against each other in a Capture The Flag Competition. The winning system then went on to compete in DEFcon’s regular CTF against human competition and did as well as was expected (dead last). The job of commentating 7 …
With support from the William and Flora Hewlett Foundation, the Berkman Center for Internet Society at Harvard University a diverse group of security and policy experts from academia, civil society, and the U.S. intelligence community convened to discuss some of the difficult problems of surveillance and cybersecurity. This occurred at the time of public about …
Through this collection of articles, we aim to share our different perspectives and insights, the latest developments and achievements in the field of cyber security, cybercrime investigations and cyber resilience. The work is multi-diciplinary in that it combines perspectives from Jaya Baloo the CISO of KPN, Henk Geveke Managing director defence safey and security at …
The Cyber Security Good Practices for ICS guide was produced by Eric Luiijf and Bert Jan the Paske for the March 2015 Global Conference on Cyberspace. It is intened to provide a guide for executives and governmental policy-makers responsible for critical (and other) infrastructures and their services. It attempt to answer for you the questions …
Cyber Security of Industrial Control Systems Eric Luiijf and Bert Jan te Paske Our society depends on the undisturbed functioning of (critical) infrastructures and their services. Critical infrastructures, and in many other organisations, rely on the correct and undisturbed functioning of Industrial Control Systems (ICS). A failure of ICS may result in a risk to …