Although many papers about Computer Security Incident Handing (CSIH) and the single teams have been published in the past [10,11,13,18], only a very few address the need for more cooperation and support of new teams within Europe. As one of the few CERTs within Europe, the DFN-CERT is very interested in the development of a suitable and efficient infrastructure for the European part of the worldwide network [3]. From this point of view we will describe some of the practical problems, and some possible approaches. To support a more deeper understanding of the actual situation in Europe, we will summarize the past development of CERTs until today. We will also use the results of a survey of European network providers to provide insights into ...
Combatting computer crime requires transnational co-operation between law enforcement agencies as we...
Exercises have long been widely used in various sectors. They are now commonly deployed by many play...
This article presents an overview and analysis of the key cybersecurity problems, challenges and req...
Within Europe, there is a very high level of knowledge and experience in product and facility certif...
Although the Czech Republic belongs to the most “internetised” countries in the world, its informati...
This paper discusses the first results of one of the four EU H2020 pilot projects launched to prepar...
In 2019, the new European Union (EU) cybersecurity regulation "Cybersecurity Act" ("CSA")1 entered i...
Terrorist acts perpetrated in the United States and then in Europe led the European Commission to pr...
Nowadays computer networks are widely spread in all spheres of human life. That is why the problem ...
Submitted to Journal of Information Security and ApplicationsThe CyberSec4Europe project, as one of ...
Computer Security Incident Response Teams (CSIRTs) or Computer Emergency Response Teams (CERTs) are ...
This Expert Letter deals with the increasingly important phenomenon of in-house Computer Emergency R...
This paper aims at proposing an original curriculum of sandwich training in cybersecurity in France ...
This document provides an analysis on the most relevant external factors that impact the cybersecuri...
As nations recognize that their critical infrastructures have integrated sophisticated information a...
Combatting computer crime requires transnational co-operation between law enforcement agencies as we...
Exercises have long been widely used in various sectors. They are now commonly deployed by many play...
This article presents an overview and analysis of the key cybersecurity problems, challenges and req...
Within Europe, there is a very high level of knowledge and experience in product and facility certif...
Although the Czech Republic belongs to the most “internetised” countries in the world, its informati...
This paper discusses the first results of one of the four EU H2020 pilot projects launched to prepar...
In 2019, the new European Union (EU) cybersecurity regulation "Cybersecurity Act" ("CSA")1 entered i...
Terrorist acts perpetrated in the United States and then in Europe led the European Commission to pr...
Nowadays computer networks are widely spread in all spheres of human life. That is why the problem ...
Submitted to Journal of Information Security and ApplicationsThe CyberSec4Europe project, as one of ...
Computer Security Incident Response Teams (CSIRTs) or Computer Emergency Response Teams (CERTs) are ...
This Expert Letter deals with the increasingly important phenomenon of in-house Computer Emergency R...
This paper aims at proposing an original curriculum of sandwich training in cybersecurity in France ...
This document provides an analysis on the most relevant external factors that impact the cybersecuri...
As nations recognize that their critical infrastructures have integrated sophisticated information a...
Combatting computer crime requires transnational co-operation between law enforcement agencies as we...
Exercises have long been widely used in various sectors. They are now commonly deployed by many play...
This article presents an overview and analysis of the key cybersecurity problems, challenges and req...