March 22, 2022

Would you like to be certified as a cybersecurity consultant?

The C3 by CONCORDIA Certification and the preparatory Course are back in 2022! What do we have for you? This year we will open again the C3 by CONCORDIA Certification exams and run the preparatory course. And we will, again, offer this for free! But we have a limited number...

Read More
March 17, 2022

5G Cybersecurity: How EU Policy framework ensures Cybersecurity and National Security of Member States?

The impact of 5G 5G, the fifth generation of mobile networks, is now a commercial reality and it is considered a key technology for society in terms of economic and social prosperity and new business procedures. Besides the obvious benefits and merits of 5G, cybersecurity related concerns are emerging as...

Read More
March 10, 2022

Blockchain-based Privacy Enforcement in the IoT domain

In 2021 there are 13.8 billion interconnected IoT devices, with an upward trend. IoT devices collect data on the surrounding environment, including sensitive and private information (e.g., wearable IoT devices). As a result, users are experiencing a loss of control over how their data is distributed and processed. Even worse,...

Read More
March 1, 2022

Understanding the needs of youth: Teaching Cybersecurity & Cybersafety to high-school students

Nowadays, we are trying to protect the users from online threats and attacks, keeping in mind that generally, users have no cybersecurity skills or knowledge. The idea here is to improve that baseline by having future users with basic or even advanced cybersecurity skills. How to do that? Educate the...

Read More
February 16, 2022

Benefits of Ecosystem approach to Cybersecurity Threat Intelligence Sharing

They always say time changes things, but in the case of threat intelligence sharing it actually does CONCORDIA consortium of more than 50 partners, whose purpose is to lead the boosting Europe’s cybersecurity future, often regards itself as an “ecosystem”. In the context of CONCORDIA we define ecosystem as “a...

Read More
February 10, 2022

Healthcare Cloud Security Explained

Years before the pandemic, the healthcare industry had already been busily digitally transforming itself. Yet, the pandemic did pull years of demand for telehealth and remote work forward into 2020. While this created a rapid and considerable shift to cloud computing, it also left a considerable number of legacy systems...

Read More
February 3, 2022

Patient profile for remote health services

Proper and successful treatments and activities within healthcare facilities are bonded to the reliable identification of patients. How can we ensure that the correct patient identity is provided and that the right treatment is received? How could IoT solutions help doctors and facilitate the health status check of patients at...

Read More
January 27, 2022

Cyber Threat Modelling for Telco

In previous blogs CONCORDIA partners have been reporting on the various Cyber Threat Intelligence (CTI) aspects that the working groups have been researching [1], [2], [3]. In this blog, we focus on another CTI aspect called Cyber Threat Modelling (CTM). Often when talking about CTI, Indicators of Compromise (IoC) are...

Read More
January 20, 2022

Anomaly detection for industrial control systems (ICS)

Industrial control systems (ICSs) combine distributed computing with physical process monitoring and control. They are comprised of elements providing feedback from the physical world (sensors) and elements influencing it (actuators), as well as computers and controller networks, which process the feedback data and issue commands to the actuators. Many ICSs...

Read More
January 14, 2022

Look back at the CONCORDIA Open Door 2021

In its third edition, Concordia Open Door (COD) continued the series of annual meetups for the European heterogenous cybersecurity community. If you've never heard about it, it's time to be aware that CONCORDIA is organizing these events to connect all the cybersecurity stakeholders in Europe to create valuable exchanges between...

Read More