The experience from famous cyber-attacks affecting large corporations tells us that reputation is a very relevant part of their intangible assets that may be compromised because of such events. In this respect, crisis communication is a critical […]
Daniel Kaye, a 30 years old British top hacker whose cyberattacks took the nation of Liberia offline, has been arrested and sentenced to almost three years in prison.
Kaye attacks on the cell phone operator Lonestar resulted […]
The Hermeneut Consortium is pleased to invite you to our first Cyber-Policy Lab, where we will be examining EU healthcare’s cyberrisk.
Hermeneut focuses on creating a holistic, dynamic cybersecurity risk assessment model and approach to cost-benefit analysis […]
With an increasingly complex and interconnected world we need to reconsider our perception of risk as it applies to cyber threats. Traditional risk models rely heavily on probabilistic approaches, which demand stable distributions and almost complete knowledge of […]
The relevance of training as a soft mitigation measure: why the existing Capability Maturity Models are not adequately addressing the issue
Training, or better cyber training, of people in the organisations is a soft mitigation countermeasure useful to reduce the cyber risk. Cyber training has some unique characteristics versus training that need a broader discussion. It is […]
How can I protect my personal data easily and effectively against access by cybercriminals?
Digital blackmail, data theft by social engineering, identity theft and password theft by phishing, as well as mass remote control of computers (so-called botnets) […]
Today, information exchange is a core activity of worldwide companies, and intangible assets like information are at risk of cyberattacks. Intellectual Property Intensive industries must be prepared to protect them against cybercrime.
Hermeneut has developed a dynamic cybersecurity risk […]
On Friday morning, November 30, one of the largest hotel chains in the world, Marriott International, announced one of the largest data breaches in history. The company declared that unknown hackers had compromised the guest […]
Today, the elusiveness of targeted attacks (TAs) and the number of evasion tactics exploited by the ongoing cyberattacks are so significant that monolithic defence strategies are not efficient anymore. Successful attacks are built to stay […]
Economic assessment of intangible assets is a topic still open to investigation for the research community. And a relevant one, considering that cyberattacks are targeting more and more a company’s intangible assets (i.e. invisible, yet pervasive resources of […]
EU policy initiatives in the field of cybersecurity, but also in the broader context of a secure interconnected digital world, have grown exponentially over the past few years. Taking into account the rapid escalation of cyber-attacks and increasing […]
Cybercrime is targeting the health sector more and more due to the potential for financial or political gain, or to expose vulnerabilities by cybercriminals, hacktivists and political activists .
There is a growing demand for […]
Today, a huge amount of our daily activities is supported by information exchange. Unfortunately, this information represents a top income to cyber-criminals. Cyber threats are increasing, especially among Intellectual Property intensive industries, putting at risk not only data, […]