Author: admin

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]More and more governmental agencies establish Security Operations Centres in order to gather information from different rage of sources and indicate threat indicators, mitigating identified threats and sharing knowledge with other parties to support incident response efforts. Threat...

SYNYO are a partner in the NOTIONES project. What is your role within this network of police and intelligence agencies across Europe?In NOTIONES project SYNYO GmbH (SYNYO) is the lead of the Dissemination, Communication and Exploitation (DEC) work package. As such the organization facilitates and...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Moldova has successfully completed a cybersecurity exercise with the support of the European Union, aimed at enhancing its resilience against cyber threats and strengthening its cooperation with other countries and organizations. The exercise, which took place from 28...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]A massive cyberattack has affected thousands of organizations around the world, including the British Broadcasting Corporation (BBC), British Airways (BA), and the government of Nova Scotia in Canada. The attack, which was detected on 6 June 2023, exploited...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The WTO Committee on Technical Barriers to Trade (TBT) held its regular meeting on 22-23 June 2023, where members discussed various topics related to cybersecurity and digital trade, as well as raised over 60 trade concerns. Some members proposed...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Rome, 19 July 2023 – The CENSIS-IISFA Report (Italian Association of Digital Forensics) was presented in the Sala Capitolare of Palazzo della Minerva of the Senate of the Republic, “The value of Cybersecurity in Italy. IT security is...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]UK guidance puts forward the idea that each person working in the organisation should think analytically when dealing with problems.  This very basic idea is the starting point to more complex analytical capacity and capability.  For anyone to...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The concept of edge computing has evolved from the intention of addressing the disadvantages associated with cloud computing. In edge computing, cloud services and resources are brought closer to the end-users, enhancing the quality of service, reducing latency,...