What do Linux system administrators need to know about the GDPR?
BlogApril 15, 2019
The General Data Protection Regulation (GDPR) is a European Union law that applies not only to EU companies, but also to all companies collecting...
Is Kleros a Fair Dispute Resolution System?
BlogOctober 21, 2018
Kleros’ approach to arbitration is radically different to traditional court systems and alternative dispute resolution methods. Relying on...
GDPR Trolls
BlogSeptember 6, 2018
Patent trolls are not a new phenomenon. They buy patents for the sole purpose of extorting and suing companies. Since patent-related litigation...
Consequences of the Late Announcement of Cyber-security Incidents
BlogSeptember 6, 2018
Cyber-security attacks that are becoming more and more common among various types and sizes of organizations may have serious effects on...
Tips for Drafting Efficient Employee Information Security Policies
BlogSeptember 6, 2018
Employee information security policies impose obligations on employees of organizations which aim to reduce the risks of cyber-attacks. Such...
The Future of Information Security
BlogApril 20, 2018
In this article, we look at the current trends in the field of information security and present speculations as to what the future of the field...
US-Russia Cyber-Security Unit: Future Reality or Pipe Dream
BlogFebruary 22, 2018
On 9th of July 2017, the President of the United States, Donald Trump, published the following tweet: “Putin & I discussed forming an...
Cybersecurity as an ethical obligation
BlogOctober 13, 2017
An ethical obligation is a standard that defines a moral course of action. Many professions are subject to comprehensive sets of ethical...
US Regions Most Vulnerable to a Cyber Attack
BlogAugust 21, 2017
In December 2016, the Identity Theft Resource Center published a report indicating the top 10 cyber-risk vulnerable U.S. regions. The ten...
Malware-as-a-service
BlogAugust 21, 2017
In May 2017, a new form of ransomware called WannaCry affected more than 230,000 personal and business computers in over 150 countries. The...
PhD Defence
BlogMay 28, 2017
Daniel will defend his PhD dissertation on 27th of June 2017. The dissertation aims to examine whether Crowdsourced Online Dispute Resolution...
Security Concerns of Flying Motorcycles
BlogApril 23, 2017
Flying motorcycles resembling the flying machines from Star Wars are about to be placed on the market. A number of developers are working on...
2016 Trends in Ransomware
BlogDecember 5, 2016
Ransomware is not a new phenomenon, yet it remains one of the most popular forms of cybercrime due to the ease of its distribution and the good...
Technologies for Conducting Privacy Compliance Assessments
BlogNovember 11, 2016
Most jurisdictions worldwide have developed comprehensive privacy laws which impose a number of obligations on organizations collecting personal...
The End of Bitcoin Ransomware?
BlogNovember 11, 2016
Bitcoin, a virtual currency generated through peer-to-peer technology and not controlled by any central authority, is used not only for paying for...