Skip to content
CONCORDIA
  • Home
    • Consortium
    • Objectives
  • Downloads
    • Deliverables
    • Publications
    • Reports
    • Dissemination material
    • Videos
  • Workshops
    • SRCNAS 2021
    • EuroSec 2021
    • WTMC 2021
    • WTMC 2020
    • Workshop Education 2020
    • EuroSec 2020
    • Women in Cyber 2019
  • Events
    • CONCORDIA Events
    • Cybersecurity Events
  • Publicity
  • News
  • Blog
  • Assets
    • CONCORDIA Service Catalog
    • CONCORDIA courses
    • CONCORDIA Cyber Ranges
      • KYPO Cyber Range Platform
      • Telecom Nancy Cyber Range
      • RISE Cyber Range
      • Airbus CyberRange
      • CODE Cyber Range
CONCORDIA

Assets

Assets

Here are presented CONCORDIA’s assets:

CONCORDIA Service Catalog:

CONCORDIA Service Catalog for Cybersecurity Experts, Start-ups, SMEs, Industry, Community

CONCORDIA Map

Towards a European Education Ecosystem for Cybersecurity

CONCORDIA Cyber Ranges:

  • KYPO Cyber Range Platform
  • TELECOM Nancy Cyber Range
  • RISE Cyber Range
  • Airbus CyberRange
  • ICE&T IT-Competence Education & Training

Twitter Feeds

concordia-h2020.euFollow

concordia-h2020.eu
concordiah2020concordia-h2020.eu@concordiah2020·
2h

In the second part of our webinar, we will show you how to create simple #cybersecurity #training for your employees or students using the KYPO #CyberRange Platform. 😊🛡️
On Wednesday! Register here ➡️https://us02web.zoom.us/webinar/register/WN_dq8pen6bQV2tyTKJtCn35Q

#OpenSource #CyberSecurity #H2020

Reply on Twitter 1384124992019861514Retweet on Twitter 13841249920198615142Like on Twitter 1384124992019861514Twitter 1384124992019861514
Retweet on Twitterconcordia-h2020.eu Retweeted
sparta_euSPARTA@sparta_eu·
5h

Another day another tool 🛠🙌developed at @sparta_eu CAPE program with @CNIT_TLC to detect and mitigate side-channel #vulnerabilities & #attacks that have risen with the publication of #SPECTRE or #MELTDOWN, and are particularly difficult to handle

👉https://sparta.eu/news/2021-04-14-sparta-cape-tool-detecting-and-mitigating-side-channel-vulnerabilities.html

2
Reply on Twitter 1384080810878242816Retweet on Twitter 13840808108782428164Like on Twitter 13840808108782428164Twitter 1384080810878242816
concordiah2020concordia-h2020.eu@concordiah2020·
6h

The Industrial Internet of Things data streams are prone to significant data manipulation risks. To solve that, in our paper we introduce real-world evaluated blockchain #I2oT architecture called #BIIT. Find out more:

🔗https://www.zora.uzh.ch/id/eprint/187940/

#CyberSecurity #H2020

Reply on Twitter 1384069259819732992Retweet on Twitter 13840692598197329922Like on Twitter 13840692598197329926Twitter 1384069259819732992
Load More...
  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter
  • YouTube

This project has received funding from the European Union’s Horizon 2020 Research and Innovation program under Grant Agreement No 830927. The website reflects only the view of the author(s) and the Commission is not responsible for any use that may be made of the information it contains.
Conditions of Use | Privacy Policy

Our site saves cookies on your device in order to deliver better content. By browsing our website you grant us the permission to store that information on your device. GDPR Policy