Blog

CONCORDIA Blog

October 26, 2021

Cybersecurity Roadmap for Europe by CONCORDIA

All future global market-dominant products and services will likely be located in the digital world, in cyberspace, or at least interact strongly with it. Cybersecurity is the pillar of the digital society and the guarantee of trust and cooperation. Therefore, cybersecurity and its roadmap cannot be analysed only from a...

Read More
October 8, 2021

QUIC protocol from the monitoring perspective

The goal of this document is to describe a network protocol QUIC from the perspective of network monitoring. Compared to the existing protocols, QUIC has several differences that we encountered when trying to monitor it. In addition to the description of the protocol, the article contains information from measuring the...

Read More
September 22, 2021

On Customer Side Cloud Security

Cloud computing encapsulates IT resources to be delivered as services over the network. As a result, Cloud customers can purchase and configure Cloud services on-demand with minimal expenses or management overhead. In spite of the benefits, Cloud systems are susceptible to a variety of security issues, e.g., unauthorized accesses or...

Read More
September 15, 2021

CONCORDIA’s Cyber Security Ecosystem: Virtual Lab, Services and Training

Several activities within CONCORDIA build and improve trusted ecosystems with the goal to provide impact and sustainability for communities. Besides Threat Intelligence Platform and DDoS Clearing House, CONCORDIA‘s ecosystem has this focus by providing lab infrastructures, services, and training. As CONCORDIA takes a holistic and scalable approach to cyber security,...

Read More
September 10, 2021

Creating trust through blockchain?

Ten years after the Bitcoin whitepaper was published, the term "blockchain" is still primarily associated with cryptocurrencies. Rightly so, one might say, as the added value is inextricably linked to the underlying data structure of Bitcoin. However, there is also an increase in the number of voices pursuing the use...

Read More
September 2, 2021

The endless identity problem

Identities in the digital world A quick search online, about the definitions of “identity” and “identity management (IdM)” reveals an underlying issue about the relation of these terms in the digital world. We see that the first one defines identity as “the distinguishing character or personality of an individual” [1][2][3]...

Read More
August 26, 2021

Universal Adversarial Perturbations for Malware

Machine learning has become a very valuable tool for different security applications, allowing to predict new threats and attacks by learning patterns from data. However, the popularity of machine learning also brings new risks, as it has been shown that machine learning algorithms have also their own vulnerabilities. This offers...

Read More
August 20, 2021

Threat Intelligence sharing: What kind of intelligence to share?

With the rapid pace of digitalisation, the expanding attack surfaces and the ever-growing number of vulnerabilities and attack techniques leaves fewer and fewer organisations capable of defending themselves and sensitive data in their care. Many recent and painfully successful cyber attacks raised again the issue of sharing threat intelligence in...

Read More
August 11, 2021

The CODE 2021: Secure supply chains for digital sovereignty?

The pandemic has shown the importance of international supply chains and how dependent we are. Attacks in the virtual space may have an increasing impact on supplies in our analogue world. Reason enough for the Research Institute CODE (RI CODE) of the Universität der Bundeswehr München (UniBw M) to dedicate...

Read More
August 5, 2021

Federated Machine Learning (FML) for Financial Sector Threat Intelligence and Fraud Prevention

Machine learning has great potential to make decision-support processes smarter, cheaper, more automated, and self-improving. However, it is also recognized that widespread commercial adoption of machine learning will require approaches that offer sufficient guarantees about the security and privacy of the process of learning models, especially when companies wish to...

Read More
1 2 3 9