Cybersicherheit der Hochschulen – Ein Kommentar zu den Empfehlungen des Wissenschaftsrats

/

Es gibt Nachholbedarf bei der Cybersicherheit an unseren Hochschulen! Soweit nichts Neues, denken wir nur an das Schicksal der Universität Duisburg-Essen, die Hochschule Hannover oder jüngst auch das Universitätsklinikum in Frankfurt. Die List der attackierten Hochschulen und Bildungseinrichtungen ist auch 2023 recht lang (https://konbriefing.com/de-topics/cyber-angriffe-universitaeten.html). Der Bericht zeigt die vielseitigen und besonderen Herausforderungen der Hochschulen auf: […]

Read more »

🗓 Event Highlights – What are you up to this month?

/

Here is a list of my upcoming talks and engagements. Scroll down for recent publications. Upcoming thought leadership talks:– 🗣️ StrategyDays IT-Security Bensberg – Let’s ask the tough Question: How do you motivate users?– 🗣️ IT Daily Thought Leadership Konferenz – Desinformation, die wahre Gefahr generativer KI für die IT-Sicherheit in Unternehmen?– 🗣️ Guest Lecture, […]

Read more »

Wie Sie Security Awareness Training zur Chefsache machen

/

Dieser Post basiert in weiten Teilen auf dem Whitepaper “Obtaining and Maintaining Executive Support for Security Awareness Training Programms“. Damit Maßnahmen zur Cybersicherheit in Unternehmen effektive Verbesserungen herbeiführen können, muss die Sicherheit zur Chefsache gemacht werden. Dies gilt insbesondere auch für Awareness Maßnahmen, die Risiken aus menschlichen Verhaltensweisen adressieren. Für die Effektivität von Cybersicherheitsmaßnahmen ist […]

Read more »

The Urgent Need For Cyber Resilience in Health Care

/

German version: https://www.healthcare-digital.de/ A US hospital closed two years after a ransomware incident, highlighting that the health sector continues to be under threat. What is the situation in Germany, DACH, and EMEA? Let’s take a closer look at the ENISA Threat Landscape: Health Sector and the IBM Cost of a Data Breach Report 2023. Healthcare […]

Read more »

[media] Warum Mitarbeiter zum Schutz von Kundendaten beitragen müssen

/

Mitarbeitende sind durch Datenschutz und Sicherheitsstandards herausgefordert, einen aktiven Beitrag zum Schutz des Unternehmens zu leisten. Dieser Post zeigt Anforderungen auf und leitet Handlungsempfehlungen ab.

Read more »

Language makes us tick – how do we make security training stick?

/

Today, the world speaks about 6,500 different languages. English and French are often considered world languages, but the languages of India and China are by far the most spoken languages due to the large population in these countries. While English remains a dominating language for science and business in the Western world, in reality, it […]

Read more »

Human-centered data protection for a remote-working world

/

Remote-work as a challenge for security Considering people, processes, and technology when planning for remote work is important. Organizations must always put people first and see the world through their eyes to make remote-work work. Otherwise, they will run the risk of their employees undermining compliance processes and using shadow IT, simply because they cannot […]

Read more »

Cybersicherheit als organisationsweiten Prozess verstehen

/ | 6 Comments on Cybersicherheit als organisationsweiten Prozess verstehen

Wesentliche Prozesse für die Cybersicherheit sind zur Absicherung von Organisationen notwendig. Hochschulen weltweit sind immer wieder Ziele von Cyberangriffen.

Read more »

So, you don’t think you’d fall for a phishing attack?

/

The number of phishing emails any PhD student gets is significant. There are invitations to submit to conferences and journals you have never heard of. Other emails stand out because they appeal to your ethics, values, or cultural norms.

Read more »

The education sector must act now

/ | 4 Comments on The education sector must act now

The education sector remains very vulnerable as ransomware shame sites continue to feature teaching institutions from around the world. Some of the latest victims were universities from Ireland and Israel, but why are such institutions so vulnerable? Their IT teams are often challenged with a diverse group of staff, students, and contractors regularly using their […]

Read more »

Empowering Privacy in the Connected Home – Communal Use of Smart Technologies

/

This article was published in the 2021 yearbook of the CDT in Cyber Security at the University of Oxford. The latest wave of internet-connected smart home technologies promises convenience and control over a diverse network of different systems, such as appliances, utilities, and entertainment devices. Striking the balance between convenience and control proves to be […]

Read more »

Approaching Data Protection by Design in Connected Communal Spaces. A Case for Contextualised Participatory Design.

/

A Case for Contextualised Participatory Design Published in the 2020 Yearbook, Centre for Doctoral Training in Cyber Security. University of Oxford. There is a gap between person-centred data protection legislation and practices, and the communal implications of internet-connected technology. Modern communal spaces – such as our homes – typically involve heterogeneous groupings of individuals with […]

Read more »

ICO Funded Research on Data Protection in Smart Homes

/

William Seymour and Martin Kraemer discuss their new project ‘Informing the Future of Data Protection in Smart Homes’ Published in the 2019 Yearbook, Centre for Doctoral Training in Cyber Security. University of Oxford. The rollout of the European General Data Protection Regulation (GDPR) has had a big impact in the cyber security world, with many […]

Read more »

[media] Whose clutter is this? Tending smart homes

/

Alexa, Roomba, Kayla, Cozmo, Ring and Nest all crave your attention This article was published in the Winter 2018 edition of the Oxford’s Computer Science Department’s magazine called Inspired Research Assistants, household helpers, toys and smart building technology, powered by electricity and data, all are making their way into ever more households. When such new […]

Read more »

Book review: A new map for relationships – creating true love at home & peace on the planet

/

Published in the 2018 Yearbook, Centre for Doctoral Training in Cyber Security. University of Oxford. Summary An applaudable account of the long-lasting efforts to transform idealism into reality – Dorothie and Martin Hellman provide an inspiring account of the long journey that saved their marriage. Through holistic thinking and compassion, they built a relationship of […]

Read more »

Anlaysis framework for smart-home devices

/

A revised version of my analysis framework for smart-home devices “mh-prize” is now available on GitHub. This framework is the product of my MSc research. Some results of using the framework were disclosed here. Comprehensive information on the build and use of the framework is available from my ACM CCS 2016 poster and my master […]

Read more »
To top