January 16, 2020

Cybersecurity threats: trends

Driven by digitalization, information sharing has been experiencing an exponential growth in the past few years. In turn, one’s eagerness to better prepare and protect depends on the ability to change the attitude from “need to know” to “need to share”. Digital technologies, most notably Artificial Intelligence (AI), have shaped...

Read More
January 9, 2020

Fast, interoperable and secure mobile network made in Switzerland

Is it possible to combine programmability, centralized control, robustness and adaptability in one network control protocol, in order to establish a reliable network of mobile nodes? RUAG provides comprehensive advice and state-of-the-art products and services for security-critical environments. As a vendor-neutral full-service partner RUAG provides tailored solutions and services to...

Read More
December 12, 2019

Assessing blockchains’ network infrastructure: why it matters for cybersecurity

Blockchain got a tremendous attention in the last few years and is considered as a disruptive technology able to redefine the collaborative processes in many activity domains including the cybersecurity. The billions of assets exchanged on a daily basis by public blockchains make them a new and attractive target for...

Read More
December 5, 2019

CODE CTF 2019 The 5th Element

2019 is the year when worlds collide. It was the pleasure of RI CODE, ITIS e.V., and Team localos to fight together with the participating teams against the darkness during the Capture the Flag (CTF) 2019 „The 5th Element – It mu5t be found“. The fifth CTF started on 22nd...

Read More
November 28, 2019

Towards Context-based Vulnerability Analysis & Inference Lancaster University

Over the last decade, a conspicuous increase in the number of vulnerabilities coupled with a paucity of detailed information about them has hindered qualified vulnerability analysis, and consequently, resulted in multiple outstanding vulnerabilities in the wild. Fig. 1 illustrates the number of vulnerabilities reported in 2019. For instance, in January...

Read More
November 21, 2019

Privacy by design: Bringing Machine Learning towards the Edge

Machine Learning (ML) & Artificial Intelligence (AI) are driven by large quantities of data, which often raises security and privacy concerns (see Figure). With the introduction of new privacy laws, such as the General Data Protection Regulation (GDPR) in the EU, there is a need to conduct R&D on approaches...

Read More
November 14, 2019

A European cybersecurity ecosystem

Europe’s continued ability to provide important public services and promote economic development is heavily dependent on digitalisation and information and communication technologies. However, the digital infrastructure required to enable this is increasingly becoming a target for attacks aimed at simultaneously undermining democracy and influencing governmental processes. Furthermore, the exposure of...

Read More
November 7, 2019

Concordia left the door open for you

On the 16th and 17th of this October, in the European cybersecurity awareness month and the Luxembourgish cybersecurity events week, the CONCORDIA OPEN DOOR event made its debut in the capital of the Grand Duchy of Luxembourg. One hundred participants from both industry and academia, including also representatives of some...

Read More
October 31, 2019

Advertising Ecosystem: What is the cost on user’s online privacy?

Introduction We constantly leak personal data to various entities while browsing the web or generally interacting with web services. For example, such leaks happen when we use mobile apps or visit shopping and news websites, all of which may display advertisements to us. Interestingly, during our browsing, we are typically...

Read More
October 24, 2019

The multidimensional landscape of Cybersecurity and the ENISA-FORTH summer school

The annual ENISA-FORTH summer school is delivering sessions on cybersecurity trends and topics as well as focused and specialized training sessions on various aspects. This year the summer school included inspired keynote speeches and presentations of experts in the fields of cryptography, malware detection, cyber defense, quantum computing, blockchain and...

Read More