Good news for smart home enthusiasts!
In the SIFIS-Home project, the code developed to secure smart homes is openly available on GitHub.
Read more >In the SIFIS-Home project, the code developed to secure smart homes is openly available on GitHub.
Read more >While the allegedly bugged Soviet hotel rooms were shrouded in secrecy, the tales about them bear a fascinating resemblance to a modern phenomenon, a home filled with smart technology that could easily be used for espionage. Smart Home ecosystems bring us convenience and practicality we have never seen before, but they also raise privacy concerns. As we invite smart technology to our homes, we are faced with the fact that convenience comes at the cost of privacy and with an unsettling hunch that we may not be aware of how much of our privacy we are trading off. Are we in fact bugging our own homes?
Read more >Digitalization is simply something that is happening. The digital environment is part of our lives whether we want it or not. It is both an opportunity and a challenge
Read more >This webinar is an effort to show the strength of our European community collaborating to make Europe a safer place in regards of cybersecurity.
Read more >Soon after the implementation of NIS 1 into national law, the NIS 2 directive, which came into force this year, was introduced by the EU Parliament in response to the increasing cyberattacks during the COVID-19 pandemic and the shortcomings of its predecessor, NIS 1. It is crucial for organizations to engage in discussions with the […]
Read more >Behavioral analysis plays an important role in cybersecurity as it helps identify and prevent cyber threats by understanding human behavior. Cybersecurity experts recognize that humans can be the weakest link in online security since even advanced technical measures can be compromised due to human errors. Therefore, extensive research has been conducted to explore the psychological […]
Read more >Here we go again! There it is, the link prompting me to click in case of a forgotten password. And needless to say, I have forgotten my password, it is gone with the wind like so many before it. So, I click and can now create a new, equally forgettable password. Am I alone or […]
Read more >Today Centria University of Applied Sciences had an introduction day for 6 new enthusiastic trainees. All of them are studying information technology. They will work with different tasks during the summertime. You will also have an opportunity to read about their achievements here in the Sifis-Home website.
Read more >Usually, when we develop software we tend to use other software, which is either part of an operating system or taken from third-party libraries that implement building blocks we prefer using instead of reimplementing them from scratch. We are the proverbial dwarves standing on the shoulders of giants and that’s usually good: better using an […]
Read more >Cyber security and sustainability goes hand in hand. The European Union is promoting both alternatives, but I have rarely seen that someone would talk about these two topics at the same time.
Read more >