helvede.net is one of the many independent Mastodon servers you can use to participate in the fediverse.
Velkommen til Helvede, fediversets hotteste instance! Vi er en queerfeministisk server, der shitposter i den 9. cirkel. Welcome to Hell, We’re a DK-based queerfeminist server. Read our server rules!

Server stats:

167
active users

#CyberSecMonth

0 posts0 participants0 posts today
GÉANT<p>This <a href="https://mstdn.social/tags/digitalcleanupday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digitalcleanupday</span></a> let’s declutter our digital lives &amp; protect our data! 🛡️</p><p>Digital waste isn’t just about storage—it’s also about <a href="https://mstdn.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a>. The more data we leave online, the easier it's for cybercriminals to exploit it through <a href="https://mstdn.social/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialEngineering</span></a> &amp; <a href="https://mstdn.social/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a>. </p><p>How much can someone learn about you online? 🎥 Watch this episode from our <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecMonth</span></a> 2023 series &amp; review what you share online.</p><p>Ready to declutter &amp; protect your data? Check this out: <a href="https://www.ibarry.ch/.../data-control-on-social-media/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ibarry.ch/.../data-control-on-</span><span class="invisible">social-media/</span></a></p>
GÉANT<p>On Valentine's Day, we'd like to celebrate love ❤️…and remind everyone to stay aware of <a href="https://mstdn.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> risks in the era of online dating.</p><p>In this episode from <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecMonth</span></a> 2024, we follow Dave, who after weeks of chatting via a dating app with someone he never met, noticed suspicious interest in his work. Thankfully, Dave broke off contact &amp; reported it to the security team. </p><p>Would you have reported it? Remember, always take a moment to think critically: your brain is the first line of defence 🛡️</p>
GÉANT<p>Memory vulnerabilities, web security, federated cyber ranges, and blue team training—what do they all have in common? </p><p>All these topics were featured in the packed programme of the ‘Fortifying Defences – Cybersecurity Initiatives &amp; Blue Teaming Strategies’&nbsp;conference hosted by&nbsp;CYNET in <a href="https://mstdn.social/tags/Cyprus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyprus</span></a> on 29-30 October.</p><p>Our Communications Manager Rosanna Norman joined with a presentation about our recent <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecMonth</span></a> campaign and shared her notes in an extensive article: <a href="https://connect.geant.org/2024/11/06/strengthening-cyber-defences-notes-from-cynets-cybersecurity-conference" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/11/06/s</span><span class="invisible">trengthening-cyber-defences-notes-from-cynets-cybersecurity-conference</span></a></p>
GÉANT<p>In response to the rise of cyberthreats to global infrastructure, <a href="https://mstdn.social/tags/NRENs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NRENs</span></a> around the world are increasingly coupling their NOCs with <a href="https://mstdn.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> Operation Centres (<a href="https://mstdn.social/tags/SOCs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SOCs</span></a>).</p><p>We spoke to Cynthia Wagner <span class="h-card" translate="no"><a href="https://mstdn.social/@evilolive28" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>evilolive28</span></a></span>, CISO and Security Manager at <span class="h-card" translate="no"><a href="https://mstdn.social/@restena" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>restena</span></a></span>, to learn more about their plans to build an <a href="https://mstdn.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a>-based SOC for the Luxembourgish R&amp;E community through the <a href="https://mstdn.social/tags/LuCySe4Re" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LuCySe4Re</span></a> project: <a href="https://connect.geant.org/2024/10/30/restena-open-source-security-operation-centre-protecting-what-matters" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/10/30/r</span><span class="invisible">estena-open-source-security-operation-centre-protecting-what-matters</span></a></p><p><a href="https://mstdn.social/tags/CONNECT47" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CONNECT47</span></a> : <a href="https://connect.geant.org/connect47" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">connect.geant.org/connect47</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecMonth</span></a> <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/Luxembourg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Luxembourg</span></a> <a href="https://mstdn.social/tags/OSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSS</span></a> <a href="https://mstdn.social/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a></p>
GÉANT<p>As our <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecMonth</span></a> campaign ‘Your brain is the first line of defence’ comes to a close, Urpo Kaila, Head of Security Policies at CSC, shares his reflections on <a href="https://mstdn.social/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InformationSecurity</span></a> and on what he believes to be also the ‘last line of defence’:</p><p>“The last line of defence is not about listing requirements, regulations and standards, or the latest hype in <a href="https://mstdn.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> tools. It is you!"</p><p>👉 <a href="https://connect.geant.org/2024/10/29/the-first-and-the-last-line-of-defence" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/10/29/t</span><span class="invisible">he-first-and-the-last-line-of-defence</span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAwareness</span></a> <a href="https://mstdn.social/tags/NRENs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NRENs</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ECSM</span></a></p>
GÉANT<p>We often hear that the <a href="https://mstdn.social/tags/HumanFactor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HumanFactor</span></a> is the weakest link in the <a href="https://mstdn.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> chain, but as cyber attacks continue to evolve, so too do our protective measures and <a href="https://mstdn.social/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAwareness</span></a></p><p>According to Enrico Venuto, CISO at Politecnico di Torino, humans are beginning to serve as the most acute and sensitive sentinels against cyber attacks: <a href="https://connect.geant.org/2024/10/28/the-weakest-link" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/10/28/t</span><span class="invisible">he-weakest-link</span></a></p><p>"The human brain is the most resilient link in the chain and the first line of defence in <a href="https://mstdn.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a>"</p><p><a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecMonth</span></a> <a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ECSM</span></a> <a href="https://mstdn.social/tags/PoliTo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PoliTo</span></a></p>
GÉANT<p><a href="https://mstdn.social/tags/CrisisManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CrisisManagement</span></a> is everyone's business.</p><p>For <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecMonth</span></a>, Maria Edblom Tauson (<span class="h-card" translate="no"><a href="https://social.sunet.se/@sunet" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>sunet</span></a></span>) explains why it's fundamental for all of us to be prepared for a crisis and to know exactly what to do when a crisis strikes.</p><p>Crisis management is a collective responsibility, and during a crisis, collaboration is the key. Being prepared is always better than being caught off guard.</p><p>🔗 <a href="https://connect.geant.org/csm24" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">connect.geant.org/csm24</span><span class="invisible"></span></a></p><p><span class="h-card" translate="no"><a href="https://mastodon.social/@nordunet" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>nordunet</span></a></span> <a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAwareness</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ECSM</span></a> <a href="https://mstdn.social/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a> <a href="https://mstdn.social/tags/CyberCrisis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberCrisis</span></a></p>
GÉANT<p>How would your institution respond if an ordinary system check uncovered a major <a href="https://mstdn.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> incident?</p><p>That’s what the University of Rijeka in <a href="https://mstdn.social/tags/Croatia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Croatia</span></a> faced when an IT team member discovered an unauthorised virtual machine template — just as the academic year began.</p><p>For <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecMonth</span></a>, we hear from Vice-Rector Senka Macesic and Head of IT Ivan Marinovic, on how the <a href="https://mstdn.social/tags/university" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>university</span></a> managed the breach, key challenges and lessons learned: <a href="https://connect.geant.org/2024/10/25/from-crisis-to-confidence-how-the-university-of-rijeka-used-a-network-breach-to-reboot-their-cybersecurity" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/10/25/f</span><span class="invisible">rom-crisis-to-confidence-how-the-university-of-rijeka-used-a-network-breach-to-reboot-their-cybersecurity</span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ECSM</span></a> <a href="https://mstdn.social/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a></p>
GÉANT<p>Would you like to hear more about responsible and ethical use of <a href="https://mstdn.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a>?</p><p>Don’t miss our <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecMonth</span></a> webinar this afternoon (24 October) at 15:00 CEST, with Andy Roebuck (GÉANT) and Floortje Jorna ( <span class="h-card" translate="no"><a href="https://social.edu.nl/@SURF" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>SURF</span></a></span> ) <a href="https://events.geant.org/event/1733/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">events.geant.org/event/1733/</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAwareness</span></a> <a href="https://mstdn.social/tags/GenAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GenAI</span></a></p>
GÉANT<p>How do you prepare students to not just navigate but shape the digital landscape in a meaningful and responsible way?</p><p>At <a href="https://mstdn.social/tags/UniversityOfZurich" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UniversityOfZurich</span></a>, the Digital Society Initiative is tackling this challenge through an innovative set of interdisciplinary <a href="https://mstdn.social/tags/education" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>education</span></a> programmes combining technical skills with critical thinking and ethical considerations.</p><p>For <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecMonth</span></a>, we interviewed Leyla Ciragan, Education and Community <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> Coordinator at DSI: <a href="https://connect.geant.org/2024/10/23/tech-savvy-and-ethically-sound-how-zurichs-digital-society-initiative-approaches-digital-skills-education" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/10/23/t</span><span class="invisible">ech-savvy-and-ethically-sound-how-zurichs-digital-society-initiative-approaches-digital-skills-education</span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a></p>
GÉANT<p>As <a href="https://mstdn.social/tags/deepfakes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deepfakes</span></a> become more realistic, the <a href="https://mstdn.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> threat they pose grows, especially since people are inclined to trust what they see and hear.</p><p>For our <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecMonth</span></a> campaign, Panayiota Smyrli, <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> analyst at CYNET-CSIRT, the Academic Computer Security Incident Response Team of <a href="https://mstdn.social/tags/Cyprus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyprus</span></a>, explains how we can detect and mitigate malicious deepfake content.</p><p>🔗 <a href="https://connect.geant.org/csm24" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">connect.geant.org/csm24</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/CyberSecurityAwareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityAwareness</span></a> <a href="https://mstdn.social/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAwareness</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ECSM</span></a> <a href="https://mstdn.social/tags/Cyberthreats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberthreats</span></a> <a href="https://mstdn.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mstdn.social/tags/GenAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GenAI</span></a></p>
GÉANT<p><a href="https://mstdn.social/tags/Tailgating" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tailgating</span></a> comes in different forms - whether it’s a stranger trying to sneak in, or a colleague claiming to have left the badge at home, letting them through can open the door to serious <a href="https://mstdn.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> risks.</p><p>Watch the new mini-series by CARNET (the Croatian Academic and Research Network) in the context of our <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecMonth</span></a> campaign to see different tailgating scenarios and learn how to recognise these <a href="https://mstdn.social/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialEngineering</span></a> tactics: <a href="https://www.youtube.com/playlist?list=PLELuOn8jN3IJNKFv_IPxdAujeez9DcLIL" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/playlist?list=PLEL</span><span class="invisible">uOn8jN3IJNKFv_IPxdAujeez9DcLIL</span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAwareness</span></a></p>
GÉANT<p>As cyber threats become increasingly sophisticated, Jisc is taking a proactive stance to help their members navigate the challenges of protecting their valuable digital assets.</p><p>In the context of <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecMonth</span></a>, we are delighted to share the news about the forthcoming launch of the Jisc <a href="https://mstdn.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> Operation Centre: <a href="https://www.jisc.ac.uk/innovation/projects/security-centre" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">jisc.ac.uk/innovation/projects</span><span class="invisible">/security-centre</span></a></p><p><a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/NRENs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NRENs</span></a> <a href="https://mstdn.social/tags/UK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UK</span></a> <a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/SecurityOperationsCentre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityOperationsCentre</span></a></p>
GÉANT<p>Accessing the Internet through free public Wi-Fi networks exposes you to serious <a href="https://mstdn.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> risks.</p><p>For our <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecMonth</span></a> campaign, Alessandro Inzerilli, network and security engineer at the Italian Research and Education Network GARR, explains why you should always use a <a href="https://mstdn.social/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a>, such as <a href="https://mstdn.social/tags/eduVPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eduVPN</span></a>, when using such unsecured networks.</p><p>🔗 <a href="https://connect.geant.org/csm24" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">connect.geant.org/csm24</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/CyberSecurityAwareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityAwareness</span></a> <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAwareness</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ECSM</span></a> <a href="https://mstdn.social/tags/Network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Network</span></a> <a href="https://mstdn.social/tags/WiFiSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WiFiSecurity</span></a> <a href="https://mstdn.social/tags/Spoofing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spoofing</span></a> <a href="https://mstdn.social/tags/ManInTheMiddle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ManInTheMiddle</span></a> <a href="https://mstdn.social/tags/WiFi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WiFi</span></a></p>
GÉANT<p><a href="https://mstdn.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> is evolving rapidly, and while some organisations have embraced it, others are cautious about the balance of benefits Vs risks.</p><p>In our next <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecMonth</span></a> webinar, Andy Roebuck (GÉANT) and Floortje Jorna ( <span class="h-card" translate="no"><a href="https://social.edu.nl/@SURF" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>SURF</span></a></span> ) will look at challenges surrounding ethical use of AI and how organisations can avoid pitfalls.</p><p>🗓️ 24 October 🕒 15:00 CEST</p><p>Register (free of charge): <a href="https://events.geant.org/event/1733/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">events.geant.org/event/1733/</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ArtificialIntelligence</span></a> <a href="https://mstdn.social/tags/GenAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GenAI</span></a> <a href="https://mstdn.social/tags/Ethics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ethics</span></a> <a href="https://mstdn.social/tags/Research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Research</span></a> <a href="https://mstdn.social/tags/Education" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Education</span></a> <a href="https://mstdn.social/tags/NRENs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NRENs</span></a> <a href="https://mstdn.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ECSM</span></a></p>
GÉANT<p>How can <a href="https://mstdn.social/tags/universities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>universities</span></a> embrace <a href="https://mstdn.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a>-driven innovation while safeguarding <a href="https://mstdn.social/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a>, data <a href="https://mstdn.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a>, and <a href="https://mstdn.social/tags/StrategicAutonomy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>StrategicAutonomy</span></a>?</p><p>For <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecMonth</span></a>, we interviewed Marlon Domingus, <a href="https://mstdn.social/tags/DPO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DPO</span></a> and AI lead at <a href="https://mstdn.social/tags/ErasmusUniversity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ErasmusUniversity</span></a> <a href="https://mstdn.social/tags/Rotterdam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Rotterdam</span></a>, on how AI is transforming <a href="https://mstdn.social/tags/DataProtection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataProtection</span></a> in <a href="https://mstdn.social/tags/education" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>education</span></a> and <a href="https://mstdn.social/tags/research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>research</span></a>, how universities can rise to the ethical challenges it presents, why responsible use of AI is more important than ever: <a href="https://connect.geant.org/2024/10/18/ai-data-privacy-and-ethics-in-higher-education-navigating-the-future" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/10/18/a</span><span class="invisible">i-data-privacy-and-ethics-in-higher-education-navigating-the-future</span></a></p><p><span class="h-card" translate="no"><a href="https://social.edu.nl/@SURF" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>SURF</span></a></span> <a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ECSM</span></a> <a href="https://mstdn.social/tags/Ethics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ethics</span></a> <a href="https://mstdn.social/tags/Academia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Academia</span></a> <a href="https://mstdn.social/tags/LLMs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLMs</span></a> <a href="https://mstdn.social/tags/DataProtection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataProtection</span></a></p>
GÉANT<p>It’s important to use strong and unique <a href="https://mstdn.social/tags/passwords" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>passwords</span></a> for all our online accounts, but very hard to remember them all… </p><p>For <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecMonth</span></a>, Raf Gillisjans, security analyst at the Belgian research and education network Belnet, tells us about the benefits of using a <a href="https://mstdn.social/tags/PasswordManager" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PasswordManager</span></a>.</p><p>🔗 <a href="https://connect.geant.org/csm24" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">connect.geant.org/csm24</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/CyberSecurityAwareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityAwareness</span></a> <a href="https://mstdn.social/tags/PasswordSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PasswordSecurity</span></a> <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ECSM</span></a></p>
GÉANT<p>How can stretched university IT teams strengthen <a href="https://mstdn.social/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAwareness</span></a> against increasingly sophisticated cyber threats while also supporting digitalisation?</p><p>During <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecMonth</span></a>, Cornelia Puhze (Switch) tells us more about their recently launched <a href="https://mstdn.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> Communications and Learning Community (SCLC): <a href="https://connect.geant.org/2024/10/16/strengthening-security-awareness-in-higher-education-how-switchs-new-community-is-bridging-silos-and-promoting-digital-skills" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/10/16/s</span><span class="invisible">trengthening-security-awareness-in-higher-education-how-switchs-new-community-is-bridging-silos-and-promoting-digital-skills</span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/CyberSecurityAwareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityAwareness</span></a> <a href="https://mstdn.social/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialEngineering</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ECSM</span></a> <a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/HumanFactor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HumanFactor</span></a> <a href="https://mstdn.social/tags/Skills" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Skills</span></a> <a href="https://mstdn.social/tags/DigitalSkills" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalSkills</span></a> <a href="https://mstdn.social/tags/DigitalCompetenceFramework" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalCompetenceFramework</span></a> <a href="https://mstdn.social/tags/DigComp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigComp</span></a></p>

Spear-phishing is a more targeted form of #phishing, where attackers focus on specific individuals and craft personalised emails, based on gathered information.

For #CyberSecMonth, we hear from João Machado (#Cybersecurity Analyst at FCT -FCCN) how #SpearPhishing works, how widespread and damaging these attacks have become, how to prevent and counter them, and some real world examples: connect.geant.org/2024/10/15/s