#CyberFriday

2025-11-28

This #cyberFriday we would like to remind you of an article offering insights into the methodology of #cybersecurity data gathering and its cross-national comparison for sake of informed policy-making. Come back to “Structured Field Coding and its Applications to National Risk and Cybersecurity Assessments” by William H. Dutton, Ruth Shillair, Louise Axon, and Carolin Weisser.
As always available on our website: acigjournal.com/Structured-Fie

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute

William H. Dutton, Ruth Shillair, Louise Axon, Carolin Weisser, “Structured Field Coding and its Applications to National Risk and Cybersecurity Assessments.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”
2025-11-07

This #cyberFriday is the time to recommend you one of the insightful articles from our archive.

Honeypots are often employed by cybersecurity teams to gain insights into possible attack scenarios. But both sides in this scenario are acting with limited knowledge. Thus a way to model the probability of various outcomes is highly useful.
In their paper “Predictive Modelling of a Honeypot System Based on a Markov Decision Process and a Partially Observable Markov Decision Process” Lidong Wang, Reed Mosher, Patti Duett, and Terril Falls provide a mathematical analysis of interactions with networks of this kind. Learn more about their results: acigjournal.com/Predictive-Mod

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute
#cybersecurity #honeypot

Lidong Wang, Reed Mosher, Patti Duett, Terril Falls, “Predictive Modelling of a Honeypot System Based on a Markov Decision Process and a Partially Observable Markov Decision Process.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”
2025-10-31

This #cyberFriday, to conclude the #EuropeanCybersecurityMonth we recommend you the latest report by the European Union Agency for Cybersecurity. This year’s edition of the ENISA Threat Landscape analysis sketches out current trends, highlights the most frequent and severe threats to the European #cybersecurity and identifies the most targeted sectors.
Find it at enisa.europa.eu/publications/e.

#ECSM #CyberSecMonth

Cover of the “ENISA Threat Landscape 2025” report. Publication date is October 2025. At the top the logos of the European Union Agency for Cybersecurity are visible.

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst