Blog

CONCORDIA Blog

January 6, 2022

The long-standing problem of email attacks

For several years now, the digital revolution has radically changed people's daily lives, both their private and work lives. The use of the Internet and its services has become indispensable for interaction between people and a priority for all companies that want to remain competitive on the market. Although digitalization...

Read More
December 9, 2021

To Share, or Not to Share, that is the trust question

Dynamic Digital Age Technology changes the world at an ever-increasing pace. Whether we like it or not. The change is expedited by both non-digital global occurrences such as the ongoing Covid-19 pandemic (Covid-19) as well as by increased and ever-converging technical capabilities such as connected devices, platforms, available data, artificial...

Read More
December 2, 2021

Who should I trust when I seek the truth?

(Machine learning for “fake-news” detection) For many of us these days, it is not unusual to wonder whether something we read or hear in the media (traditional or social) is true or not. One of the main activities in the CONCORDIA project is focused on the User-Centric Security, where our...

Read More
November 25, 2021

CONCORDIA’s Incident Clearing House: a Closer Look

In this blog post we are going to have a closer look at one of the core components of CONCORDIA's Threat Intelligence Platform: the Incident Clearing House. What does it do? How does it work? And how does it integrate with the other platform components? A Core Component The Incident...

Read More
November 18, 2021

The long-standing problem of email attacks

For several years now, the digital revolution has radically changed people's daily lives, both their private and work lives. The use of the Internet and its services has become indispensable for interaction between people and a priority for all companies that want to remain competitive on the market. Although digitalization...

Read More
November 11, 2021

The market for lemons on the market for ideas

In a previous blog post i explained the link between trust, misinformation and user behavior. Two major points follow from that text: The first is that trust is an invisible enabler of the socio-technical interactions within a system, whereas misinformation (or information disorder/pollution in general) is a tangible disabler of...

Read More
November 4, 2021

Developing and running a testbed for the DDoS Clearing House

Demonstrating the DDoS Clearing House in a representative simulated environment Authors: Thijs van den Hout (1), Remco Poortinga - van Wijnen (2), Cristian Hesselman (1, 3), Christos Papachristos (4), Karin Vink (1) SIDN, the Netherlands SURF, the Netherlands University of Twente, the Netherlands FORTH, Greece We have created a distributed...

Read More
October 26, 2021

Cybersecurity Roadmap for Europe by CONCORDIA

All future global market-dominant products and services will likely be located in the digital world, in cyberspace, or at least interact strongly with it. Cybersecurity is the pillar of the digital society and the guarantee of trust and cooperation. Therefore, cybersecurity and its roadmap cannot be analysed only from a...

Read More
October 8, 2021

QUIC protocol from the monitoring perspective

The goal of this document is to describe a network protocol QUIC from the perspective of network monitoring. Compared to the existing protocols, QUIC has several differences that we encountered when trying to monitor it. In addition to the description of the protocol, the article contains information from measuring the...

Read More
September 22, 2021

On Customer Side Cloud Security

Cloud computing encapsulates IT resources to be delivered as services over the network. As a result, Cloud customers can purchase and configure Cloud services on-demand with minimal expenses or management overhead. In spite of the benefits, Cloud systems are susceptible to a variety of security issues, e.g., unauthorized accesses or...

Read More