Blog

CONCORDIA Blog

February 13, 2020

CONCORDIA visiting patients at Smart Home

Are our homes becoming smart homes in the near future? Are hospitals and patient care moving to our homes soon? Innovation means different things to different people, depending on the context in which it is being reviewed. This blog reviews the emerging concept for new values for cybersecurity in Europe...

Read More
February 6, 2020

“Cyber Threat Intelligence”: what should I share?

Try to look for it; it is not going to be easy. Searching a good definition of “Cyber Threat Intelligence” (CTI) is one of those activities that can easily go on for hours without obtaining a fully satisfying result. This holds true not just for single experts and academic researchers,...

Read More
January 30, 2020

Security Playbook Automation through CONCORDIA

The ability to quickly identify and understand the nature of cyber threats as they emerge, but also acting with agility in applying effective cyber controls to prevent and respond to continuously evolving cyberattacks is of undeniable importance. As the typical time an attacker needs from the initial compromise to complete...

Read More
January 23, 2020

Improving Quality Assurance and Situational Awareness for CONCORDIA’s incident clearing house

CONCORDIA aims to build a threat intelligence platform that facilitates cross-sector sharing of actionable information on imminent or already successful attacks on your networks. But besides simply informing you in case of already successful attacks, there is more that can be done with this information if you look more closely....

Read More
January 16, 2020

Cybersecurity threats: trends

Driven by digitalization, information sharing has been experiencing an exponential growth in the past few years. In turn, one’s eagerness to better prepare and protect depends on the ability to change the attitude from “need to know” to “need to share”. Digital technologies, most notably Artificial Intelligence (AI), have shaped...

Read More
January 9, 2020

Fast, interoperable and secure mobile network made in Switzerland

Is it possible to combine programmability, centralized control, robustness and adaptability in one network control protocol, in order to establish a reliable network of mobile nodes? RUAG provides comprehensive advice and state-of-the-art products and services for security-critical environments. As a vendor-neutral full-service partner RUAG provides tailored solutions and services to...

Read More
December 12, 2019

Assessing blockchains’ network infrastructure: why it matters for cybersecurity

Blockchain got a tremendous attention in the last few years and is considered as a disruptive technology able to redefine the collaborative processes in many activity domains including the cybersecurity. The billions of assets exchanged on a daily basis by public blockchains make them a new and attractive target for...

Read More
December 5, 2019

CODE CTF 2019 The 5th Element

2019 is the year when worlds collide. It was the pleasure of RI CODE, ITIS e.V., and Team localos to fight together with the participating teams against the darkness during the Capture the Flag (CTF) 2019 „The 5th Element – It mu5t be found“. The fifth CTF started on 22nd...

Read More
November 28, 2019

Towards Context-based Vulnerability Analysis & Inference Lancaster University

Over the last decade, a conspicuous increase in the number of vulnerabilities coupled with a paucity of detailed information about them has hindered qualified vulnerability analysis, and consequently, resulted in multiple outstanding vulnerabilities in the wild. Fig. 1 illustrates the number of vulnerabilities reported in 2019. For instance, in January...

Read More
November 21, 2019

Privacy by design: Bringing Machine Learning towards the Edge

Machine Learning (ML) & Artificial Intelligence (AI) are driven by large quantities of data, which often raises security and privacy concerns (see Figure). With the introduction of new privacy laws, such as the General Data Protection Regulation (GDPR) in the EU, there is a need to conduct R&D on approaches...

Read More
1 2 3