<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Public Security on Cybersecurity Incidents in Austria</title><link>https://cybersicherheitsvorfall.at/en/tags/public-security/</link><description>Recent content in Public Security on Cybersecurity Incidents in Austria</description><generator>Hugo</generator><language>en</language><lastBuildDate>Fri, 07 Feb 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://cybersicherheitsvorfall.at/en/tags/public-security/index.xml" rel="self" type="application/rss+xml"/><item><title>Fostering Cyber Competencies</title><link>https://cybersicherheitsvorfall.at/en/blog/fostering-cyber-competencies/</link><pubDate>Fri, 07 Feb 2025 00:00:00 +0000</pubDate><guid>https://cybersicherheitsvorfall.at/en/blog/fostering-cyber-competencies/</guid><description>&lt;p>Essential foundations in a connected world&lt;/p>
&lt;p>In an era of rapid digitalization and omnipresent cyber threats, building cyber competency is indispensable for security authorities such as the Austrian Federal Ministry of the Interior (BMI). Likewise, organizations must develop cyber competency to effectively protect their digital infrastructure and meet the challenges of an increasingly connected world. Cyber competency here means far more than technical expertise &amp;ndash; it encompasses an understanding of digital developments, the associated challenges, as well as the possibilities and limitations of cybersecurity and the fight against and containment of cybercrime.&lt;/p></description></item><item><title>Distinguishing Cyber Terms</title><link>https://cybersicherheitsvorfall.at/en/blog/distinguishing-cyber-terms/</link><pubDate>Tue, 07 Jan 2025 00:00:00 +0000</pubDate><guid>https://cybersicherheitsvorfall.at/en/blog/distinguishing-cyber-terms/</guid><description>&lt;p>Cybercrime vs. Cybersecurity … or Cyber Prevention?!&lt;/p>
&lt;p>Cybersecurity is a central field of knowledge today &amp;ndash; not least because smartphones, computers, and IoT devices shape our daily lives.&lt;/p>
&lt;p>Almost everyone who communicates, researches, or shops online now comes into contact with cybercrime. Just as opinions can be diverse, conceptions of cybercrime also vary considerably.&lt;/p>
&lt;p>&lt;img src="https://cybersicherheitsvorfall.at/images/gegenueberstellung.png" alt="Broad distinction between three core cyber domains in the context of security policy">
&lt;em>Figure 1: Broad distinction between three core cyber domains in the context of security policy&lt;/em>&lt;/p></description></item></channel></rss>