Blog

CONCORDIA Blog

September 29, 2022

Cybersecurity: Why adopting Gorille® in your EDR?

The aim of this blog post is to present the result of our work and our innovative technology tested within the European consortium Concordia and explain how our Gorille® morphological analysis solution can detect, identify and analyze any malware. When it comes to cybersecurity, using an EDR has become a...

Read More
September 22, 2022

Ethereum’s P2P network monitoring and Sybil Attack Prevention

In our previous blog post “Assessing blockchains’ network infrastructure: why it matters for cybersecurity”, we motivated why the monitoring of blockchains’ underlying P2P network is critical to evaluate network properties impacting their resiliency and to detect suspicious nodes that can threaten the proper functioning of the P2P network, for instance...

Read More
September 1, 2022

Push the button: Our updated DDoS testbed in action at CONCORDIA Open Door 2022

In one of our previous blogs, we introduced the testbed we developed for the DDoS Clearing House and described how we used it to pilot the system in a realistic environment. Over the past months, we have improved the testbed and will demonstrate it working as part of the CONCORDIA...

Read More
August 5, 2022

CONCORDIA and Cyber Diplomacy

In the scope of community building activities, CONCORDIA project established cooperation with EU Cyber Direct project that supports EU cyber diplomacy and international digital engagements. The EU Cyber Direct – EU Cyber Diplomacy Initiative is funded by the Service for Foreign Policy Instruments (FPI) at the European Commission. The project...

Read More
July 28, 2022

KYPO cyber range platform: technology & education

Several activities within CONCORDIA build and improve trusted ecosystems with the goal to provide impact and sustainability for communities. Besides Threat Intelligence Platform and DDoS Clearing House, CONCORDIA‘s ecosystem has this focus by providing lab infrastructures, services, and training. In today`s blog post, we will focus on the training part....

Read More
July 21, 2022

An experience of becoming a Certified Cybersecurity Consultant (C3 by CONCORDIA)

Within the CONCORDIA project, C3 by CONCORDIA certification was developed for European cybersecurity professionals who want to have their knowledge and skills validated with a certificate. In this blog post, I will describe my experience of how I gained the certificate, and I hope it could help someone else with...

Read More
Education
July 1, 2022

New shape of health care with Edge devices

Edge computing has been one of the key digital transformations in the last year and it is reshaping health care by bringing medicine into a new direction. Bringing big data processing and storage closer to the source helps to better analyse and collect data as well as improving the accuracy...

Read More
Education
June 23, 2022

Towards an integrated platform for skills in cyber built on the European Cybersecurity Skills Framework

Difficult to understand the trainings big picture The needs to protect oneself against threats to information and operations, to maintain the cybersecurity posture of an organization and to increase the resilience against such threats, are still urgently felt by all interested parties. A core component to fulfilling these needs, is...

Read More
June 9, 2022

On the Security Assessment of the Cloud

A plethora of highly effective Threat Analysis (TA) techniques exist that focus on analyzing threats to specifically targeted assets (e.g., components, services), typically considering static interconnections among them. On the other hand, the Cloud is a dynamic environment where resources can instantiate or migrate to provide rapid scalability to the...

Read More
May 25, 2022

The ethical contextualization of trust

In the blog series I presented here [1][2], I tried to establish the connection between the human/user behavior and the online trustworthiness of systems, products, people, places, information… I also pointed out the various ways in which system designers try to address trust-related issues, the constrained context in which this...

Read More