{"version":"https://jsonfeed.org/version/1","title":"Women4Cyber Greece","home_page_url":"https://women4cybergreece.com","description":"Women4Cyber Greece","author":{"name":"Women4Cyber Greece"},"items":[{"id":"https://women4cybergreece.com/blog/f/content-creation-online-personal-data-and-freedom-of-expression","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/2949403d-1587-4aeb-ac18-8bf0dc133947/ChatGPT%20Image%20May%2015%2C%202026%2C%2001_30_22%20PM.png\"/><p>An examination of the balance between personal data protection and freedom of expression in the digital environment.</p>","url":"https://women4cybergreece.com/blog/f/content-creation-online-personal-data-and-freedom-of-expression","title":"Content Creation Online: Personal Data and Freedom of Expression","summary":"An examination of the balance between personal data protection and freedom of expression in the digital environment.","date_modified":"2026-05-22T07:00:00Z"},{"id":"https://women4cybergreece.com/blog/f/the-quantum-threat-why-digital-privacy-is-no-longer-guaranteed","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/2949403d-1587-4aeb-ac18-8bf0dc133947/ChatGPT%20Image%20May%2015%2C%202026%2C%2001_17_52%20PM.png\"/><p>Undoubtedly cryptography has become a pillar in the modern digital world. From securing the global financial system to protecting personal, everyday messaging from malicious actors, society as we know it would fail to fu...</p>","url":"https://women4cybergreece.com/blog/f/the-quantum-threat-why-digital-privacy-is-no-longer-guaranteed","title":"The Quantum Threat: Why Digital Privacy is No Longer Guaranteed","summary":"Undoubtedly cryptography has become a pillar in the modern digital world. From securing the global financial system to protecting personal, everyday messaging from malicious actors, society as we know it would fail to fu...","date_modified":"2026-05-15T10:18:34Z"},{"id":"https://women4cybergreece.com/blog/f/european-cybersecurity-in-context-a-policy-oriented-analysis","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/2949403d-1587-4aeb-ac18-8bf0dc133947/yulmertyuiowxsdfcds.JPG\"/><p>This study, edited by Professor Luigi Martino and Nada Gamal, approaches the topic from a multidisciplinary point of view, considering critical infrastructures, skills, strategic autonomy, AI, cybercrime, privacy, and th...</p>","url":"https://women4cybergreece.com/blog/f/european-cybersecurity-in-context-a-policy-oriented-analysis","title":"European Cybersecurity in Context:  A Policy-Oriented Analysis","summary":"This study, edited by Professor Luigi Martino and Nada Gamal, approaches the topic from a multidisciplinary point of view, considering critical infrastructures, skills, strategic autonomy, AI, cybercrime, privacy, and th...","date_modified":"2022-08-26T14:16:23Z"},{"id":"https://women4cybergreece.com/blog/f/cybersecurity-of-5g-networks-eu-publishes-report","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/pm18ze7\"/><p>Read the analysis here:  Cybersecurity of 5G networks: EU publishes report on the security of Open RAN  - Intelligent CIO Europe </p>","url":"https://women4cybergreece.com/blog/f/cybersecurity-of-5g-networks-eu-publishes-report","title":"Cybersecurity of 5G networks: EU publishes report","summary":"Read the analysis here:  Cybersecurity of 5G networks: EU publishes report on the security of Open RAN  - Intelligent CIO Europe ","date_modified":"2022-08-26T13:58:46Z"},{"id":"https://women4cybergreece.com/blog/f/ransomware-reported-incidents-are-only-the-tip-of-the-iceberg","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/2949403d-1587-4aeb-ac18-8bf0dc133947/6b8b3d22-b419-4289-b575-43544e988a4a.png\"/><p>The threat landscape report on ransomware attacks published today by the European Union Agency for Cybersecurity (ENISA) uncovers the shortcomings of the current reporting mechanisms across the EU. </p>","url":"https://women4cybergreece.com/blog/f/ransomware-reported-incidents-are-only-the-tip-of-the-iceberg","title":"Ransomware: Reported Incidents are only the tip of the iceberg","summary":"The threat landscape report on ransomware attacks published today by the European Union Agency for Cybersecurity (ENISA) uncovers the shortcomings of the current reporting mechanisms across the EU. ","date_modified":"2022-08-26T13:54:56Z"},{"id":"https://women4cybergreece.com/blog/f/why-cybersecurity-in-the-eu-should-matter-to-you","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/103232\"/><p>From stolen data to blocked hospital systems: cyberattacks can have perilous consequences. Learn more about cybersecurity and its importance, Society.</p>","url":"https://women4cybergreece.com/blog/f/why-cybersecurity-in-the-eu-should-matter-to-you","title":"Why cybersecurity in the EU should matter to you","summary":"From stolen data to blocked hospital systems: cyberattacks can have perilous consequences. Learn more about cybersecurity and its importance, Society.","date_modified":"2022-08-26T13:51:12Z"},{"id":"https://women4cybergreece.com/blog/f/nis2---provisional-agreement-by-the-council-and-the-e-parliament","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/2957\"/><p>On May 13th, 2022 the Council and the European Parliament agreed on measures for a high common level of cybersecurity across the Union, to further improve the resilience and incident response capacities of both the publi...</p>","url":"https://women4cybergreece.com/blog/f/nis2---provisional-agreement-by-the-council-and-the-e-parliament","title":"NIS2 - Provisional agreement by the Council and the E. Parliament","summary":"On May 13th, 2022 the Council and the European Parliament agreed on measures for a high common level of cybersecurity across the Union, to further improve the resilience and incident response capacities of both the publi...","date_modified":"2022-06-06T10:32:09Z"},{"id":"https://women4cybergreece.com/blog/f/yeswehacks-platform-bug-bounty-programme","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/2949403d-1587-4aeb-ac18-8bf0dc133947/YesWeHack-logo_croped.png\"/><p>YesWeHack is a global security company headquartered in Paris, France. It provides a crowdsourced platform for bug bounty programs where ethical hackers can report security exploits and vulnerabilities.  </p>","url":"https://women4cybergreece.com/blog/f/yeswehacks-platform-bug-bounty-programme","title":"YesWeHack's platform bug bounty programme!","summary":"YesWeHack is a global security company headquartered in Paris, France. It provides a crowdsourced platform for bug bounty programs where ethical hackers can report security exploits and vulnerabilities.  ","date_modified":"2022-06-06T10:26:28Z"},{"id":"https://women4cybergreece.com/blog/f/read-the-european-councils-new-conclusions-on-eus-cybersecurity","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/366\"/><p>On 23rd May 2022, the European Council approved conclusions on developing the European Union’s cyber posture. The posture aims to demonstrate the EU’s determination to provide immediate and long-term responses to threat ...</p>","url":"https://women4cybergreece.com/blog/f/read-the-european-councils-new-conclusions-on-eus-cybersecurity","title":"Read the European Council's new conclusions on EU's cybersecurity","summary":"On 23rd May 2022, the European Council approved conclusions on developing the European Union’s cyber posture. The posture aims to demonstrate the EU’s determination to provide immediate and long-term responses to threat ...","date_modified":"2022-06-06T10:20:16Z"}]}