Blog

CONCORDIA Blog

July 29, 2021

Faith-based security, the case of the fax

Recently I was surprised by a comment made by an anonymous reviewer on the security of various methods for information exchange, where he or she noted that the approach mentioned “would not offer the same properties as a fax in terms of confidentiality.” This begs the question “what confidentiality properties...

Read More
July 16, 2021

CONCORDIA’s Sector-specific Pilots – the basics

The collaboration between the academic and industrial community, where the research provides solutions for the identified industrial use cases, is organized in CONCORDIA's work package by developing the so-called pilots. CONCORDIA is addressing industrial challenges in seven pilots – five sector-specific and two cross-sector pilots. In CONCORDIA, we focus on...

Read More
July 2, 2021

Cloud Security: Paving the Way to Smarter Security Automation!

Cloud is everywhere, often invisible… The development of the Internet has been leveraged by the deployment of large data centers providing computing resources (software application, virtualized hardware equipment) that can be shared and combined to build elaborated services. These resources available in a metered manner are contributing to lower the...

Read More
June 24, 2021

Beyond COVID-19 in Threat Intelligence

More than a year in this global pandemic, more needs to be done about Threat Intelligence It is the summer of 2021, more than a year into dealing with the global pandemic cause by COVID-19 has past, and we are starting to see “the light at the end of tunnel”,...

Read More
June 17, 2021

US elections 2020: a retrospective analysis of the Twitter corpus

Social media plays a crucial role, especially during elections’ period either for communication, administration and dissemination. Twitter constitutes one of the most popular social media with millions of active users, while a significant part of the online discourse is part of this network. The analysis of the content can shed...

Read More
June 10, 2021

An Update on Security Playbook Standardization

A year ago, we supported creating a technical committee within the Organization for the Advancement of Structured Information Standards (OASIS) to work on defining a standard way for documenting security playbooks that are both human-understandable and machine-executable. Today we have published our first committee specification, getting closer to having a...

Read More
June 3, 2021

Building Machine Learning Models with Privacy by Design in Mind

Nicolas Kourtellis, Ph.D. Introduction Machine Learning (ML) methods can identify patterns that describe humans’ behaviors. This can only happen when the methods are given enough data to train on. Depending on the type of data at hand, these methods can model and be trained to detect distinct behaviors, properties or...

Read More
May 27, 2021

Roadmap for the 1st CONCORDIA Cybersecurity Skills Certification Scheme

The subject of Cybersecurity skills and the relevant persisting gap1 has allowed a variety of cybersecurity courses and certification schemes to arise2. In each case, the certification scheme owners have decided upon an implementation method based on their experience, practice and beliefs. But which one is the most suitable for...

Read More
May 20, 2021

On the Recommendation of Protections Services

Cyberattacks determine a rising threat for governments, companies, and end-users. Beyond compromising individuals' security and privacy, malicious attackers can negatively impact the economic situation of businesses supported by digital systems. Within the landscape of cyberattacks, Distributed Denial-of-Service (DDoS) attacks remain one of the most dangerous threats to service providers worldwide....

Read More
May 8, 2021

Quo Vadis European Digital Sovereignty?

The Corona crisis has impressively demonstrated the dependence of our modern society on ICT (information and communication technology). The major challenges in climate protection and health, currently especially about the COVID-19 pandemic, can only be solved or supported with trustworthy IT. As digitalization is developing exponentially, it is changing the...

Read More
1 2 3 8