Blog

CONCORDIA Blog

March 1, 2022

Understanding the needs of youth: Teaching Cybersecurity & Cybersafety to high-school students

Nowadays, we are trying to protect the users from online threats and attacks, keeping in mind that generally, users have no cybersecurity skills or knowledge. The idea here is to improve that baseline by having future users with basic or even advanced cybersecurity skills. How to do that? Educate the...

Read More
February 16, 2022

Benefits of Ecosystem approach to Cybersecurity Threat Intelligence Sharing

They always say time changes things, but in the case of threat intelligence sharing it actually does CONCORDIA consortium of more than 50 partners, whose purpose is to lead the boosting Europe’s cybersecurity future, often regards itself as an “ecosystem”. In the context of CONCORDIA we define ecosystem as “a...

Read More
February 10, 2022

Healthcare Cloud Security Explained

Years before the pandemic, the healthcare industry had already been busily digitally transforming itself. Yet, the pandemic did pull years of demand for telehealth and remote work forward into 2020. While this created a rapid and considerable shift to cloud computing, it also left a considerable number of legacy systems...

Read More
February 3, 2022

Patient profile for remote health services

Proper and successful treatments and activities within healthcare facilities are bonded to the reliable identification of patients. How can we ensure that the correct patient identity is provided and that the right treatment is received? How could IoT solutions help doctors and facilitate the health status check of patients at...

Read More
January 27, 2022

Cyber Threat Modelling for Telco

In previous blogs CONCORDIA partners have been reporting on the various Cyber Threat Intelligence (CTI) aspects that the working groups have been researching [1], [2], [3]. In this blog, we focus on another CTI aspect called Cyber Threat Modelling (CTM). Often when talking about CTI, Indicators of Compromise (IoC) are...

Read More
January 20, 2022

Anomaly detection for industrial control systems (ICS)

Industrial control systems (ICSs) combine distributed computing with physical process monitoring and control. They are comprised of elements providing feedback from the physical world (sensors) and elements influencing it (actuators), as well as computers and controller networks, which process the feedback data and issue commands to the actuators. Many ICSs...

Read More
January 14, 2022

Look back at the CONCORDIA Open Door 2021

In its third edition, Concordia Open Door (COD) continued the series of annual meetups for the European heterogenous cybersecurity community. If you've never heard about it, it's time to be aware that CONCORDIA is organizing these events to connect all the cybersecurity stakeholders in Europe to create valuable exchanges between...

Read More
January 6, 2022

The long-standing problem of email attacks

For several years now, the digital revolution has radically changed people's daily lives, both their private and work lives. The use of the Internet and its services has become indispensable for interaction between people and a priority for all companies that want to remain competitive on the market. Although digitalization...

Read More
December 9, 2021

To Share, or Not to Share, that is the trust question

Dynamic Digital Age Technology changes the world at an ever-increasing pace. Whether we like it or not. The change is expedited by both non-digital global occurrences such as the ongoing Covid-19 pandemic (Covid-19) as well as by increased and ever-converging technical capabilities such as connected devices, platforms, available data, artificial...

Read More
December 2, 2021

Who should I trust when I seek the truth?

(Machine learning for “fake-news” detection) For many of us these days, it is not unusual to wonder whether something we read or hear in the media (traditional or social) is true or not. One of the main activities in the CONCORDIA project is focused on the User-Centric Security, where our...

Read More