mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.
Irish Mastodon - run from Ireland, we welcome all who respect the community rules and members.

Administered by:

Server stats:

1.6K
active users

#csm24

0 posts0 participants0 posts today
GÉANT<p>As our <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecMonth</span></a> campaign ‘Your brain is the first line of defence’ comes to a close, Urpo Kaila, Head of Security Policies at CSC, shares his reflections on <a href="https://mstdn.social/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> and on what he believes to be also the ‘last line of defence’:</p><p>“The last line of defence is not about listing requirements, regulations and standards, or the latest hype in <a href="https://mstdn.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> tools. It is you!"</p><p>👉 <a href="https://connect.geant.org/2024/10/29/the-first-and-the-last-line-of-defence" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/10/29/t</span><span class="invisible">he-first-and-the-last-line-of-defence</span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAwareness</span></a> <a href="https://mstdn.social/tags/NRENs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NRENs</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECSM</span></a></p>
GÉANT<p>We often hear that the <a href="https://mstdn.social/tags/HumanFactor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HumanFactor</span></a> is the weakest link in the <a href="https://mstdn.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> chain, but as cyber attacks continue to evolve, so too do our protective measures and <a href="https://mstdn.social/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAwareness</span></a></p><p>According to Enrico Venuto, CISO at Politecnico di Torino, humans are beginning to serve as the most acute and sensitive sentinels against cyber attacks: <a href="https://connect.geant.org/2024/10/28/the-weakest-link" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/10/28/t</span><span class="invisible">he-weakest-link</span></a></p><p>"The human brain is the most resilient link in the chain and the first line of defence in <a href="https://mstdn.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a>"</p><p><a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecMonth</span></a> <a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECSM</span></a> <a href="https://mstdn.social/tags/PoliTo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PoliTo</span></a></p>
GÉANT<p><a href="https://mstdn.social/tags/CrisisManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrisisManagement</span></a> is everyone's business.</p><p>For <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecMonth</span></a>, Maria Edblom Tauson (<span class="h-card" translate="no"><a href="https://social.sunet.se/@sunet" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sunet</span></a></span>) explains why it's fundamental for all of us to be prepared for a crisis and to know exactly what to do when a crisis strikes.</p><p>Crisis management is a collective responsibility, and during a crisis, collaboration is the key. Being prepared is always better than being caught off guard.</p><p>🔗 <a href="https://connect.geant.org/csm24" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">connect.geant.org/csm24</span><span class="invisible"></span></a></p><p><span class="h-card" translate="no"><a href="https://mastodon.social/@nordunet" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>nordunet</span></a></span> <a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAwareness</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECSM</span></a> <a href="https://mstdn.social/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://mstdn.social/tags/CyberCrisis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCrisis</span></a></p>
GÉANT<p>How would your institution respond if an ordinary system check uncovered a major <a href="https://mstdn.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> incident?</p><p>That’s what the University of Rijeka in <a href="https://mstdn.social/tags/Croatia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Croatia</span></a> faced when an IT team member discovered an unauthorised virtual machine template — just as the academic year began.</p><p>For <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecMonth</span></a>, we hear from Vice-Rector Senka Macesic and Head of IT Ivan Marinovic, on how the <a href="https://mstdn.social/tags/university" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>university</span></a> managed the breach, key challenges and lessons learned: <a href="https://connect.geant.org/2024/10/25/from-crisis-to-confidence-how-the-university-of-rijeka-used-a-network-breach-to-reboot-their-cybersecurity" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/10/25/f</span><span class="invisible">rom-crisis-to-confidence-how-the-university-of-rijeka-used-a-network-breach-to-reboot-their-cybersecurity</span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECSM</span></a> <a href="https://mstdn.social/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a></p>
GÉANT<p>Would you like to hear more about responsible and ethical use of <a href="https://mstdn.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a>?</p><p>Don’t miss our <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecMonth</span></a> webinar this afternoon (24 October) at 15:00 CEST, with Andy Roebuck (GÉANT) and Floortje Jorna ( <span class="h-card" translate="no"><a href="https://social.edu.nl/@SURF" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>SURF</span></a></span> ) <a href="https://events.geant.org/event/1733/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">events.geant.org/event/1733/</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAwareness</span></a> <a href="https://mstdn.social/tags/GenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GenAI</span></a></p>
GÉANT<p>Practical steps for secure and ethical <a href="https://mstdn.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> use by educators and researchers by Marlon Domingus (Erasmus University Rotterdam):</p><p>3️⃣ 𝗖𝗼𝗻𝗳𝗶𝗴𝘂𝗿𝗲 𝗔𝗜 𝘁𝗼𝗼𝗹𝘀 𝘄𝗶𝘁𝗵 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗮𝗻𝗱 𝗽𝗿𝗶𝘃𝗮𝗰𝘆 𝗶𝗻 𝗺𝗶𝗻𝗱<br>Before using AI tools, ensure you fully understand how they work, what data they collect, and where that data is stored. Set them up thoughtfully — don’t rely on automated decisions or default settings to ensure compliance with security and data privacy standards.</p><p><a href="https://connect.geant.org/2024/10/24/practical-steps-for-secure-and-ethical-ai-use-by-educators-and-researchers" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/10/24/p</span><span class="invisible">ractical-steps-for-secure-and-ethical-ai-use-by-educators-and-researchers</span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/GenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GenAI</span></a> <span class="h-card" translate="no"><a href="https://social.edu.nl/@SURF" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>SURF</span></a></span></p>
GÉANT<p>Practical steps for secure and ethical <a href="https://mstdn.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> use by educators and researchers by Marlon Domingus (Erasmus University Rotterdam):</p><p>2️⃣ 𝗧𝗵𝗶𝗻𝗸 𝗰𝗿𝗶𝘁𝗶𝗰𝗮𝗹𝗹𝘆<br>AI can help spark creativity and get people out of ‘bubbles’ of thinking by presenting different perspectives — but critical thinking is vital. “AI outputs can look dazzling, but you only benefit from them if you understand the domain &amp; topic well enough to distinguish nonsense from genuinely valid insights.”</p><p><a href="https://connect.geant.org/2024/10/24/practical-steps-for-secure-and-ethical-ai-use-by-educators-and-researchers" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/10/24/p</span><span class="invisible">ractical-steps-for-secure-and-ethical-ai-use-by-educators-and-researchers</span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSM24</span></a> <span class="h-card" translate="no"><a href="https://social.edu.nl/@SURF" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>SURF</span></a></span></p>
GÉANT<p>Practical steps for secure and ethical <a href="https://mstdn.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> use by educators and researchers by Marlon Domingus (Erasmus University Rotterdam):</p><p>1️⃣ 𝗩𝗲𝗿𝗶𝗳𝘆 𝗔𝗜-𝗴𝗲𝗻𝗲𝗿𝗮𝘁𝗲𝗱 𝗶𝗻𝘀𝗶𝗴𝗵𝘁𝘀<br>Don’t blindly trust AI outputs — always verify sources and context. “In science, it is usual to, in principle, challenge every truth claim, to test its validity. With the growing societal impact of AI, this should also become common-sense practice for daily life.”</p><p><a href="https://connect.geant.org/2024/10/24/practical-steps-for-secure-and-ethical-ai-use-by-educators-and-researchers" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/10/24/p</span><span class="invisible">ractical-steps-for-secure-and-ethical-ai-use-by-educators-and-researchers</span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAwareness</span></a> <a href="https://mstdn.social/tags/GenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GenAI</span></a> <span class="h-card" translate="no"><a href="https://social.edu.nl/@SURF" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>SURF</span></a></span></p>
GÉANT<p>What does secure and ethical use of <a href="https://mstdn.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> look like in practice in <a href="https://mstdn.social/tags/HigherEducation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HigherEducation</span></a> and <a href="https://mstdn.social/tags/research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>research</span></a>? </p><p>Marlon Domingus, DPO and AI lead at Erasmus University Rotterdam, shared with us some practical steps to protect data, systems, and core ethical principles for educators and researchers looking to integrate AI into their work: <a href="https://connect.geant.org/2024/10/24/practical-steps-for-secure-and-ethical-ai-use-by-educators-and-researchers" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/10/24/p</span><span class="invisible">ractical-steps-for-secure-and-ethical-ai-use-by-educators-and-researchers</span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAwareness</span></a> <a href="https://mstdn.social/tags/GenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GenAI</span></a> <span class="h-card" translate="no"><a href="https://social.edu.nl/@SURF" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>SURF</span></a></span></p>
GÉANT<p>How do you prepare students to not just navigate but shape the digital landscape in a meaningful and responsible way?</p><p>At <a href="https://mstdn.social/tags/UniversityOfZurich" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UniversityOfZurich</span></a>, the Digital Society Initiative is tackling this challenge through an innovative set of interdisciplinary <a href="https://mstdn.social/tags/education" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>education</span></a> programmes combining technical skills with critical thinking and ethical considerations.</p><p>For <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecMonth</span></a>, we interviewed Leyla Ciragan, Education and Community <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> Coordinator at DSI: <a href="https://connect.geant.org/2024/10/23/tech-savvy-and-ethically-sound-how-zurichs-digital-society-initiative-approaches-digital-skills-education" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/10/23/t</span><span class="invisible">ech-savvy-and-ethically-sound-how-zurichs-digital-society-initiative-approaches-digital-skills-education</span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a></p>
GÉANT<p>As <a href="https://mstdn.social/tags/deepfakes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>deepfakes</span></a> become more realistic, the <a href="https://mstdn.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> threat they pose grows, especially since people are inclined to trust what they see and hear.</p><p>For our <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecMonth</span></a> campaign, Panayiota Smyrli, <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> analyst at CYNET-CSIRT, the Academic Computer Security Incident Response Team of <a href="https://mstdn.social/tags/Cyprus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyprus</span></a>, explains how we can detect and mitigate malicious deepfake content.</p><p>🔗 <a href="https://connect.geant.org/csm24" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">connect.geant.org/csm24</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/CyberSecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityAwareness</span></a> <a href="https://mstdn.social/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAwareness</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECSM</span></a> <a href="https://mstdn.social/tags/Cyberthreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberthreats</span></a> <a href="https://mstdn.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mstdn.social/tags/GenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GenAI</span></a></p>
GÉANT<p><a href="https://mstdn.social/tags/Tailgating" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tailgating</span></a> comes in different forms - whether it’s a stranger trying to sneak in, or a colleague claiming to have left the badge at home, letting them through can open the door to serious <a href="https://mstdn.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> risks.</p><p>Watch the new mini-series by CARNET (the Croatian Academic and Research Network) in the context of our <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecMonth</span></a> campaign to see different tailgating scenarios and learn how to recognise these <a href="https://mstdn.social/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialEngineering</span></a> tactics: <a href="https://www.youtube.com/playlist?list=PLELuOn8jN3IJNKFv_IPxdAujeez9DcLIL" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/playlist?list=PLEL</span><span class="invisible">uOn8jN3IJNKFv_IPxdAujeez9DcLIL</span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAwareness</span></a></p>
GÉANT<p>As cyber threats become increasingly sophisticated, Jisc is taking a proactive stance to help their members navigate the challenges of protecting their valuable digital assets.</p><p>In the context of <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecMonth</span></a>, we are delighted to share the news about the forthcoming launch of the Jisc <a href="https://mstdn.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> Operation Centre: <a href="https://www.jisc.ac.uk/innovation/projects/security-centre" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">jisc.ac.uk/innovation/projects</span><span class="invisible">/security-centre</span></a></p><p><a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/NRENs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NRENs</span></a> <a href="https://mstdn.social/tags/UK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UK</span></a> <a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/SecurityOperationsCentre" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityOperationsCentre</span></a></p>
GÉANT<p>Accessing the Internet through free public Wi-Fi networks exposes you to serious <a href="https://mstdn.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> risks.</p><p>For our <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecMonth</span></a> campaign, Alessandro Inzerilli, network and security engineer at the Italian Research and Education Network GARR, explains why you should always use a <a href="https://mstdn.social/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a>, such as <a href="https://mstdn.social/tags/eduVPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eduVPN</span></a>, when using such unsecured networks.</p><p>🔗 <a href="https://connect.geant.org/csm24" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">connect.geant.org/csm24</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/CyberSecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityAwareness</span></a> <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAwareness</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECSM</span></a> <a href="https://mstdn.social/tags/Network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Network</span></a> <a href="https://mstdn.social/tags/WiFiSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WiFiSecurity</span></a> <a href="https://mstdn.social/tags/Spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spoofing</span></a> <a href="https://mstdn.social/tags/ManInTheMiddle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ManInTheMiddle</span></a> <a href="https://mstdn.social/tags/WiFi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WiFi</span></a></p>
GÉANT<p><a href="https://mstdn.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> is evolving rapidly, and while some organisations have embraced it, others are cautious about the balance of benefits Vs risks.</p><p>In our next <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecMonth</span></a> webinar, Andy Roebuck (GÉANT) and Floortje Jorna ( <span class="h-card" translate="no"><a href="https://social.edu.nl/@SURF" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>SURF</span></a></span> ) will look at challenges surrounding ethical use of AI and how organisations can avoid pitfalls.</p><p>🗓️ 24 October 🕒 15:00 CEST</p><p>Register (free of charge): <a href="https://events.geant.org/event/1733/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">events.geant.org/event/1733/</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArtificialIntelligence</span></a> <a href="https://mstdn.social/tags/GenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GenAI</span></a> <a href="https://mstdn.social/tags/Ethics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ethics</span></a> <a href="https://mstdn.social/tags/Research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Research</span></a> <a href="https://mstdn.social/tags/Education" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Education</span></a> <a href="https://mstdn.social/tags/NRENs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NRENs</span></a> <a href="https://mstdn.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECSM</span></a></p>
GÉANT<p>How can <a href="https://mstdn.social/tags/universities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>universities</span></a> embrace <a href="https://mstdn.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a>-driven innovation while safeguarding <a href="https://mstdn.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a>, data <a href="https://mstdn.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a>, and <a href="https://mstdn.social/tags/StrategicAutonomy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StrategicAutonomy</span></a>?</p><p>For <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecMonth</span></a>, we interviewed Marlon Domingus, <a href="https://mstdn.social/tags/DPO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DPO</span></a> and AI lead at <a href="https://mstdn.social/tags/ErasmusUniversity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ErasmusUniversity</span></a> <a href="https://mstdn.social/tags/Rotterdam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rotterdam</span></a>, on how AI is transforming <a href="https://mstdn.social/tags/DataProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataProtection</span></a> in <a href="https://mstdn.social/tags/education" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>education</span></a> and <a href="https://mstdn.social/tags/research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>research</span></a>, how universities can rise to the ethical challenges it presents, why responsible use of AI is more important than ever: <a href="https://connect.geant.org/2024/10/18/ai-data-privacy-and-ethics-in-higher-education-navigating-the-future" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/10/18/a</span><span class="invisible">i-data-privacy-and-ethics-in-higher-education-navigating-the-future</span></a></p><p><span class="h-card" translate="no"><a href="https://social.edu.nl/@SURF" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>SURF</span></a></span> <a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECSM</span></a> <a href="https://mstdn.social/tags/Ethics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ethics</span></a> <a href="https://mstdn.social/tags/Academia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Academia</span></a> <a href="https://mstdn.social/tags/LLMs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLMs</span></a> <a href="https://mstdn.social/tags/DataProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataProtection</span></a></p>
GÉANT<p>It’s important to use strong and unique <a href="https://mstdn.social/tags/passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwords</span></a> for all our online accounts, but very hard to remember them all… </p><p>For <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecMonth</span></a>, Raf Gillisjans, security analyst at the Belgian research and education network Belnet, tells us about the benefits of using a <a href="https://mstdn.social/tags/PasswordManager" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PasswordManager</span></a>.</p><p>🔗 <a href="https://connect.geant.org/csm24" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">connect.geant.org/csm24</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/CyberSecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityAwareness</span></a> <a href="https://mstdn.social/tags/PasswordSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PasswordSecurity</span></a> <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECSM</span></a></p>
GÉANT<p>How can stretched university IT teams strengthen <a href="https://mstdn.social/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAwareness</span></a> against increasingly sophisticated cyber threats while also supporting digitalisation?</p><p>During <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecMonth</span></a>, Cornelia Puhze (Switch) tells us more about their recently launched <a href="https://mstdn.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> Communications and Learning Community (SCLC): <a href="https://connect.geant.org/2024/10/16/strengthening-security-awareness-in-higher-education-how-switchs-new-community-is-bridging-silos-and-promoting-digital-skills" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/10/16/s</span><span class="invisible">trengthening-security-awareness-in-higher-education-how-switchs-new-community-is-bridging-silos-and-promoting-digital-skills</span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/CyberSecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityAwareness</span></a> <a href="https://mstdn.social/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialEngineering</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECSM</span></a> <a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/HumanFactor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HumanFactor</span></a> <a href="https://mstdn.social/tags/Skills" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Skills</span></a> <a href="https://mstdn.social/tags/DigitalSkills" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalSkills</span></a> <a href="https://mstdn.social/tags/DigitalCompetenceFramework" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalCompetenceFramework</span></a> <a href="https://mstdn.social/tags/DigComp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigComp</span></a></p>
GÉANT<p>Cyber espionage is one of the most advanced types of cyberattacks, often involving highly sophisticated and carefully planned techniques.</p><p>For our <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecMonth</span></a> campaign, Andrej Zieger ( <span class="h-card" translate="no"><a href="https://infosec.exchange/@dfncert" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>dfncert</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@DFN" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>DFN</span></a></span> ) tells us why it's something we all need to be aware of, and how we can protect ourselves and our organisations.</p><p>🔗 <a href="https://connect.geant.org/csm24" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">connect.geant.org/csm24</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/CyberEspionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberEspionage</span></a> <a href="https://mstdn.social/tags/CyberSecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityAwareness</span></a> <a href="https://mstdn.social/tags/Research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Research</span></a> <a href="https://mstdn.social/tags/Education" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Education</span></a> <a href="https://mstdn.social/tags/NRENs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NRENs</span></a> <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattacks</span></a> <a href="https://mstdn.social/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECSM</span></a></p>
GÉANT<p>Spear-phishing is a more targeted form of <a href="https://mstdn.social/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a>, where attackers focus on specific individuals and craft personalised emails, based on gathered information.</p><p>For <a href="https://mstdn.social/tags/CyberSecMonth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecMonth</span></a>, we hear from João Machado (<a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> Analyst at FCT -FCCN) how <a href="https://mstdn.social/tags/SpearPhishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SpearPhishing</span></a> works, how widespread and damaging these attacks have become, how to prevent and counter them, and some real world examples: <a href="https://connect.geant.org/2024/10/15/spear-phishing-hack-the-mind-and-access-the-network" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/10/15/s</span><span class="invisible">pear-phishing-hack-the-mind-and-access-the-network</span></a></p><p><a href="https://mstdn.social/tags/CSM24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSM24</span></a> <a href="https://mstdn.social/tags/CyberSecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityAwareness</span></a> <a href="https://mstdn.social/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialEngineering</span></a> <a href="https://mstdn.social/tags/ECSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECSM</span></a> <a href="https://mstdn.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mstdn.social/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattacks</span></a></p>