Blog

CONCORDIA Blog

December 22, 2022

CONCORDIA’s take on Threat Intelligence

Defining the scope of a threat intelligence platform  “Threat Intelligence” was a topic of paramount importance since the beginning of CONCORDIA. This aspect is not just present among the initial objectives, but it almost derives directly from the main purpose of the project. Specifically, if CONCORDIA sets its primary goal...

Read More
December 15, 2022

Cyber-attack impacts on multi-UAV missions: key observations to guide mission design

Many applications can benefit from the use of groups of collaborating unoccupied aerial vehicles (UAVs), including logistics, disaster management, or fire monitoring and prevention. However, like all other computing and communicating platforms, UAVs can be vulnerable to cyber-attacks, which may jeopardise their mission, fully or partially. As part of CONCORDIA,...

Read More
Education
December 7, 2022

A proposal for a Cybersecurity Skills Certification Framework

How the existence of a Cybersecurity Skills Certification Framework will help the market and what if the connection to the European Cybersecurity Skills Framework? One of the main directions of the work performed by the CONCORDIA project is cybersecurity related education and training. Other posts such as [[1], [2], [3]]...

Read More
November 16, 2022

Summer School on real-world crypto and privacy in Šibenik 2022

This year's Summer School on real-world crypto and privacy took place in Šibenik, Croatia  June 13–17, 2022. The summer school was jointly organised by the Digital Security (DiS) group, Radboud University (The Netherlands), Max-Planck Institute for Security and Privacy (Germany), ETH Zurich Information Security and Privacy Center (Switzerland) and Faculty...

Read More
November 10, 2022

News on CONCORDIA Finacial Pilot

Continuing our series of posts about Cybersecurity and the exploitation of Cyber Threat Intelligence (CTI) information sharing in the Financial Sector, we want to update you on the advances of our work in CONCORDIA Financial Pilot. We identified that one of the main roadblocks of a widespread information sharing and...

Read More
November 3, 2022

CONCORDIA Mobile Threat Modelling Framework

A MITRE-based modelling framework for the Telco Industry Throughout the course of the CONCORDIA project, many partners have showcased and highlighted the importance and advantages of deploying and applying cyber threat intelligence techniques as a way to enhance security practices within an organization. Moreover, efforts between Telenor [1], OsloMet [2]...

Read More
October 26, 2022

Spamley web app: studying the cognitive aspect behind the phishing problem

For several years now, the digital revolution has radically changed people's daily lives, both their private and work ones. Although digitalization has been a growing phenomenon for decades, the coronavirus pandemic has accelerated it even further, making it necessary to transfer various activities to the Internet. The e-mail has further...

Read More
October 20, 2022

How Quantum Computing Will Change Encryption Forever

The interaction between companies and threats have always been cyclical. Threats and vulnerabilities are exposed and exploited, hackers attack and breach companies, and companies try to fix, patch, and plug their cybersecurity vulnerabilities. Cybersecurity, essentially, looks to stay one step ahead of hackers who are trying to stay one step...

Read More
October 13, 2022

First CONCORDIA workshop on collaborative DDoS mitigation

Tech talks, captivating discussions, and networking to advance the field On September 15, 2022, we held the First CONCORDIA Workshop on Collaborative DDoS Mitigation. The goal of the workshop was to discuss advances and bottlenecks in collaborative DDoS mitigation, and to strengthen the community engaged with this topic. We welcomed...

Read More
September 29, 2022

Cybersecurity: Why adopting Gorille® in your EDR?

The aim of this blog post is to present the result of our work and our innovative technology tested within the European consortium Concordia and explain how our Gorille® morphological analysis solution can detect, identify and analyze any malware. When it comes to cybersecurity, using an EDR has become a...

Read More
1 2 3 14