Advertisement · 728 × 90
#
Hashtag
#CyberFriday
Advertisement · 728 × 90
Ignas Kalpokas, “Post-Truth and Information Warfare in their Technological Context.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”

Ignas Kalpokas, “Post-Truth and Information Warfare in their Technological Context.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”

This week’s #cyberFriday we would like to remind you of an article from our archive, “Post-Truth and Information Warfare in their Technological Context” by Ignas Kalpokas, discussing modern communication technologies as a factor enabling the proliferation of disinformation.
tinyurl.com/5n7fbtsh

0 0 0 0
Lidong Wang, Reed Mosher, Patti Duett, Terril Falls, “Predictive Modelling of a Honeypot System Based on a Markov Decision Process and a Partially Observable Markov Decision Process.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”

Lidong Wang, Reed Mosher, Patti Duett, Terril Falls, “Predictive Modelling of a Honeypot System Based on a Markov Decision Process and a Partially Observable Markov Decision Process.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”

The paper “Predictive Modelling of a Honeypot System Based on a Markov Decision Process and a Partially Observable Markov Decision Process” provides a mathematical analysis of interactions with network honeypots under conditions of uncertainty tinyurl.com/5ezuzrvh
#cyberFriday #cybersecurity

1 1 0 0
Cover of the “ENISA Threat Landscape 2025” report. Publication date is October 2025. At the top the logos of the European Union Agency for Cybersecurity are visible.

Cover of the “ENISA Threat Landscape 2025” report. Publication date is October 2025. At the top the logos of the European Union Agency for Cybersecurity are visible.

This #cyberFriday, to conclude the #EuropeanCybersecurityMonth we recommend you the latest ENISA Threat Landscape report. This year’s edition of the analysis sketches out current trends and highlights the most important threats to the European #cybersecurity. Find it at tinyurl.com/4wezyd66

1 1 0 0
“October is #CyberSecMonth. #ThinkB4Uclick.” In the upper right corner the logo of ECSM can be seen. Below there is a tagline “Get involved!” in a speech bubble and an address cybersecuritymonth.eu.

“October is #CyberSecMonth. #ThinkB4Uclick.” In the upper right corner the logo of ECSM can be seen. Below there is a tagline “Get involved!” in a speech bubble and an address cybersecuritymonth.eu.

In October the European Cybersecurity Month campaign takes place. In Poland ECSM is coordinated by our publisher, #NASK. Dear readers from Europe and from all over the world – care to share what actions are carried out in your countries to promote cybersecurity for everyone?
#ACIG #CyberFriday #ECSM

1 1 0 0
A photograph of Anna Felkner, a woman wearing glasses and a bright blouse, looking confidently into the camera, with a white frame and semi-transparent background, alongside with the texts “Welcome on board!” and “Anna Felkner PhD joins the ACIG Editorial Team.” At the top of the image the logos of ACIG and NASK can be seen.

A photograph of Anna Felkner, a woman wearing glasses and a bright blouse, looking confidently into the camera, with a white frame and semi-transparent background, alongside with the texts “Welcome on board!” and “Anna Felkner PhD joins the ACIG Editorial Team.” At the top of the image the logos of ACIG and NASK can be seen.

We have the pleasure to announce that Anna Felkner PhD, the Director of the Cybersecurity Research and Development Division at #NASK, has joined the #ACIG’s team as an Editor. Our warmest welcome!
#scientificPublishing #cyberFriday

1 1 0 0
Kovid Tiwari, Ajay Kumar Phulre, Devraj Vishnu, Saravanan D “Enhancing Secure Key Management Techniques for Optimised 5G Network Slicing Security.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”

Kovid Tiwari, Ajay Kumar Phulre, Devraj Vishnu, Saravanan D “Enhancing Secure Key Management Techniques for Optimised 5G Network Slicing Security.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”

This #cyberFriday we would like to remind you about the fantastic article “Enhancing Secure Key Management Techniques for Optimised 5G Network Slicing Security” by Kovid Tiwari, Ajay Kumar Phulre, Devraj Vishnu and Saravanan D. Read it at #ACIG: tinyurl.com/2xmaslv7

1 1 0 0
picture

picture

Friday IT tip: log out, check alerts, remove unused team access, and store data securely before the weekend. A quick sweep now means less worry on Monday. RWebZ helps you build safe, weekly business habits!

#ITTip #CyberFriday #RWebZ

0 0 0 0
Text: Prof. Alina Bargaoanu,
Cyber Influence Defence: Applying the DISARM Framework to a Cognitive Hacking Case from the Romanian Digital Space

Text: Prof. Alina Bargaoanu, Cyber Influence Defence: Applying the DISARM Framework to a Cognitive Hacking Case from the Romanian Digital Space

This #CyberFriday we recall an important article by Prof. Alina Bargaoanu and Mihaela Pana. Using the DISARM model, the authors identified key technological factors and emerging threats that challenge the detection and resilience of the Romanian digital space.
➡️ tinyurl.com/26prsggh
ACIG by #NASK

1 1 0 0
Kristan Stoddart “Russia’s Cyber Campaigns and the Ukraine War: From the ‘Gray Zone’ to the ‘Red Zone’”

Kristan Stoddart “Russia’s Cyber Campaigns and the Ukraine War: From the ‘Gray Zone’ to the ‘Red Zone’”

This #cyberFriday our eyes turn towards #Ukraine, where we can see how modern warfare spills into the #cybersecurity area. Learn how Kristan Stoddart’s analysis from our last year’s special issue on the ongoing war systematizes the knowledge on state-on-state cyberattacks at:
tinyurl.com/2cuxba94

1 1 0 0
On a dark background: Title of the article “Denmark’s Sector Responsibility Principle: A Tedious Cyber Resilience Strategy” by Mikkel Storm Jensen. ACIG and NASK logos are visible.

On a dark background: Title of the article “Denmark’s Sector Responsibility Principle: A Tedious Cyber Resilience Strategy” by Mikkel Storm Jensen. ACIG and NASK logos are visible.

🇩🇰This #CyberFriday we invite you to read a case study of the Danish cyber #resilience strategy. In his article Mikkel Storm Jensen discusses organizational, legal and political aspects of the implementation of #sectorResponsibilityPrinciple.
➡️ tinyurl.com/28mzw4bx
#resilience #cybersecurity #NASK

1 1 0 0
On a dark background: Title of the article “Deepfake Influence Tactics through the Lens of Cialdini’s Principles: Case Studies and the DEEP FRAME Tool Proposal” by Pawel Zegarow and Ewelina Bartuzi. ACIG and NASK logos are visible.

On a dark background: Title of the article “Deepfake Influence Tactics through the Lens of Cialdini’s Principles: Case Studies and the DEEP FRAME Tool Proposal” by Pawel Zegarow and Ewelina Bartuzi. ACIG and NASK logos are visible.

This #CyberFriday, we invite you to read an article by Paweł Zegarow and Ewelina Bartuzi in which they introduce the DEEP FRAME checklist, a tool for examining and documenting AI-generated material, developed in the context of Dr. Robert Cialdini’s six principles of persuasion.
tinyurl.com/2aoloopv

0 0 0 0
Text: 
Julia Puczyńska, Youcef Djenouri, AI in Disinformation Detection

Text: Julia Puczyńska, Youcef Djenouri, AI in Disinformation Detection

This #CyberFriday, we will try to find an answer on how to fight a key tactic of disinformation The paper AI in Disinformation Detection by Julia Puczyńska and Youcef Djenouri examines the DISARM Framework and UQ as key tools for building resilient defenses. Read it now:
tinyurl.com/273snyuw

1 1 0 0
Text: Mateusz Nawrocki, Joanna Kołodziej "Vulnerabilities of Web Applications: Good Practices and New Trends”

Text: Mateusz Nawrocki, Joanna Kołodziej "Vulnerabilities of Web Applications: Good Practices and New Trends”

#CyberFriday is the time for a showcase of another insightful article by our brilliant Authors 🔍
Mateusz Nawrocki and Joanna Kołodziej compare the experimental results of simulated cyberattacks in scenarios with different security strategies.
Read their article here 👇
tinyurl.com/22l6pyt8

4 1 0 0
Post image

This #CyberFriday, just before #InternationalWomensDay, we celebrate the brilliant female authors of ACIG’s Journal.
Women make up about a third of the researchers we collaborate with—we’re proud to be their journal of choice, but there’s more to do!

1 1 0 0

Don’t just patch vulnerabilities—assume attackers are already inside.

#cyberfriday #cybersecurity

7 1 1 0
Post image

Gift Card Amazon theft: bought a holiday gift card via Amazon and it arrived compromised before shipping. The shipping package was sealed. I don't recommend online gift cards. #amazon #giftcards #retailtheft #cyberfriday

0 0 0 0
Video

It’s Friday, yes #itsfriday 🔥

#cyberfriday. Les go….

0 0 0 0

Nu bij 1 invite 4 gratis! #cyberfriday

1 0 0 0