Latest News About - European Union Agency for Cybersecurity

 
Show/hide duplicate news articles.
<<10<12345678910>>>10
 
Show/hide duplicate news articles.
<<10<12345678910>>>10

Tools

Load latest edition

Thursday, October 6, 2022

10:31:00 AM CEST

Subscribe
RSS | KML | MAP

Languages Collapse menu...Expand menu...

Select your languages

ab
ar
az
be
bg
bs
ca
cs
da
de
el
en
eo
es
et
fa
fi
fo
fr
ga
gl
ha
he
hi
hr
hu
hy
id
is
it
ja
ka
km
ko
ku
ky
lb
lo
lt
lv
mk
ml
ms
mt
my
na
ne
nl
no
ny
os
pap
pl
ps
pt
ro
ru
si
sk
sl
so
sq
sr
sv
sw
ta
th
tr
uk
ur
vi
zh
all
Show additional languagesHide additional languages

Interface:

Legend Collapse menu...Expand menu...

Quotes... Extracted quotes

Yuriy Bulygin told: “A few macro-level trends are driving demand for Eclypsium’s solution, and therefore made this the right time to raise funding to enable accelerated growth,”

businesstelegraph Tuesday, October 4, 2022 3:35:00 PM CEST

Yuriy Bulygin said: “The sheer number and complexity of modern devices requires highly specialized understanding and expertise in equipment built by various manufacturers — with all firmware and software shipped with these devices — and requires a unique set of capabilities to detect compromised devices and protect from further compromise,” “Because firmware plays such a critical role in enabling and defending our technology supply chains, many traditional security vendors have opportunistically added ‘firmware-specific features’ to their products. However, firmware security is not an add-on”

businesstelegraph Tuesday, October 4, 2022 3:35:00 PM CEST

Yuriy Bulygin said: “Organizations are increasingly turning to zero trust principles to defend their device fleets and operations. As such, the default position is to avoid trusting systems and users until explicitly verified … [yet] each device represents a complex system of computers with their own embedded code and operating systems — each built by many suppliers,” “Organizations need to understand all layers of hardware and software code for device verification to be truly successful, from all of the code embedded into devices and supplied by manufacturers to operating systems and applications. Software and firmware code embedded into devices is the most fundamental and privileged software running on each device”

businesstelegraph Tuesday, October 4, 2022 3:35:00 PM CEST

Juhan Lepassaar added: "The number of successful online attacks could be greatly reduced if more people knew how to detect and react. This is what the activities of the European Cybersecurity Month are all about. The new awards introduced this year will give more visibility and incentive to develop tools and campaigns to help EU citizens. It marks a further step in the ten-year development of the ECSM. Building a trusted and cyber secure Europe also means to help all businesses thrive in a secure digital environment"

globalsecuritymag Friday, September 30, 2022 9:23:00 AM CEST

Juhan Lepassaar zei: "De reden waarom zij niet rapporteren is dat zij het niet weten. De reden waarom zij het niet weten, is omdat zij niet delen. Het is een vicieuze cirkel die we op Europees niveau moeten zien te doorbreken"

executive-people Wednesday, September 28, 2022 10:13:00 AM CEST

Rebekka Weiss said: “For end users, certification and equal requirements within the European market create the necessary trust, which will help to ensure that the Identity Wallet is widely used,”

euractiv-en Wednesday, September 28, 2022 9:35:00 AM CEST

Rebekka Weiss says: “This makes it clear once again that the development of digital identities and the wallet is not an end in itself,”

euractiv-en Wednesday, September 28, 2022 9:35:00 AM CEST

Juhan Lepassaar sagte: „Das sollte nicht heißen, dass wir weniger wachsam sein sollten. Die gesamte Bedrohungslandschaft ist nach wie vor schwierig“

euractiv-de Tuesday, September 27, 2022 1:42:00 PM CEST

Juhan Lepassaar sagte: „Der Grund, warum die Länder das nicht melden, ist, dass sie es nicht wissen. Der Grund, warum sie es nicht wissen, ist, dass sie es nicht teilen. Es ist also ein Teufelskreis, den wir auf Unionsebene irgendwie durchbrechen müssen“

euractiv-de Tuesday, September 27, 2022 1:42:00 PM CEST

Juhan Lepassaar said: “The reason why they are not reporting is that they don’t know. The reason why they don’t know is they don’t share. So it is a vicious circle that we need to somehow crack at the Union level,”

euractiv-en Tuesday, September 27, 2022 8:16:00 AM CEST

Marcus Schmitz says: “bound to happen and such random incidents will happen to other shipping companies as well as companies of any other industry,” “In this regard, the shipping industry is neither more nor less vulnerable than any other globally operating business”

seanews Saturday, September 24, 2022 3:00:00 PM CEST

Marcus Schmitz says: “The role of the in-house IT must be extended to include the OT systems,” “The in-house IT must be trained on OT systems, must spend time onboard, must be included in purchasing processes, and must take responsibility”

seanews Saturday, September 24, 2022 3:00:00 PM CEST

Aldo Patriciello states: “we will be unable to support a Directive in plenary along the lines of the current negotiations”

euractiv-en Friday, September 23, 2022 7:30:00 PM CEST

Juhan Lepassaar said: "The future security of our digital world will heavily depend on our capacity to develop an efficient & adequate cybersecurity workforce. The cybersecurity job market is expected to soar further. By improving skills recognition and supporting the design of cybersecurity-related training programmes, the new framework announced today is a big step in the right direction"

globalsecuritymag Wednesday, September 21, 2022 5:06:00 PM CEST

Tim Wade told: "Strategically, security practitioners must continue to pivot away from preventative-based security architecture into resilience-based security architecture,"

wsimag Sunday, September 18, 2022 8:00:00 PM CEST

Margaritis Schinas said: "We try to rebalance the responsibility towards manufacturers who must ensure that they put in the market products that are digitally secure,"

euobserver Thursday, September 15, 2022 4:02:00 PM CEST

Margaritis Schinas added: “to protect both consumers and businesses from products that have inadequate security features,”

euractiv-en Thursday, September 15, 2022 2:48:00 PM CEST

Margaritis Schinas said: "the cybersecurity parts of a product like this escape regulation. And this is what we're coming to address,"

politico-eu Thursday, September 15, 2022 12:39:00 PM CEST

Martin Schulz betont: „Seinen Startplatz hat sich Jason durch seine Leistungen im Vorwettbewerb verdient. Tolle Leistung“

mittelstandcafe Wednesday, September 14, 2022 1:18:00 PM CEST

Claudia Segre spiega: “Secondo l’ultimo rapporto Censis sulla sicurezza informatica – (\*) – al 64,6% di cittadini e imprese è capitato di essere bersaglio di e-mail ingannevoli per estorcere dati sensibili”

LaNazione Wednesday, August 31, 2022 8:51:00 PM CEST

Claudia Segre aggiunge: “Nel corso del 2021 – (\*) – il Cnaipic, Centro nazionale anticrimine informatico per la protezione delle infrastrutture critiche della Polizia postale, ha gestito 5.434 attacchi informatici significativi, in media 15 al giorno, ai danni di servizi informatici di sistemi istituzionali, infrastrutture critiche informatizzate di interesse nazionale, infrastrutture sensibili di interesse regionale, grandi imprese. Sono 110.524 gli alert di sicurezza riferibili a minacce per sistemi informatici/telematici oggetto di tutela del Centro”

LaNazione Wednesday, August 31, 2022 8:51:00 PM CEST

Claudia Segre detto: "L'intelligenza artificiale può aiutare a difendersi meglio dagli attacchi informatici, sempre più frequenti nel nostro Paese ai danni soprattutto di giovanissimi e anziani. Secondo l'ultimo rapporto Censis sulla sicurezza informatica, infatti, al 64,6% di cittadini e imprese è capitato di essere bersaglio di e-mail ingannevoli per estorcere dati sensibili - (\*) - L'European Union Agency for Cybersecurity nel suo ultimo focus mette in guardia sulla minaccia derivante da attacchi ransomware in cui l'Italia è tra i Paesi più a rischio, al quarto posto dietro Stati Uniti, Germania e Francia. Nel corso del 2021 il Cnaipic, Centro nazionale anticrimine informatico per la protezione delle infrastrutture critiche della Polizia postale, ha gestito 5.434 attacchi informatici significativi, in media 15 al giorno, ai danni di servizi informatici di sistemi istituzionali, infrastrutture critiche informatizzate di interesse nazionale, infrastrutture sensibili di interesse regionale, grandi imprese. Sono 110.524 gli alert di sicurezza riferibili a minacce per sistemi informatici/telematici oggetto di tutela del Centro"

ilmessaggero Monday, August 29, 2022 6:46:00 PM CEST

Tim Wade told: "Strategically, security practitioners must continue to pivot away from preventative-based security architecture into resilience-based security architecture,"

wsimag Tuesday, August 9, 2022 1:21:00 AM CEST

Daily number of articles in this category

Trend data not available for this selection.