June 3, 2021

Building Machine Learning Models with Privacy by Design in Mind

Nicolas Kourtellis, Ph.D. Introduction Machine Learning (ML) methods can identify patterns that describe humans’ behaviors. This can only happen when the methods are given enough data to train on. Depending on the type of data at hand, these methods can model and be trained to detect distinct behaviors, properties or...

Read More
May 27, 2021

Roadmap for the 1st CONCORDIA Cybersecurity Skills Certification Scheme

The subject of Cybersecurity skills and the relevant persisting gap1 has allowed a variety of cybersecurity courses and certification schemes to arise2. In each case, the certification scheme owners have decided upon an implementation method based on their experience, practice and beliefs. But which one is the most suitable for...

Read More
May 20, 2021

On the Recommendation of Protections Services

Cyberattacks determine a rising threat for governments, companies, and end-users. Beyond compromising individuals' security and privacy, malicious attackers can negatively impact the economic situation of businesses supported by digital systems. Within the landscape of cyberattacks, Distributed Denial-of-Service (DDoS) attacks remain one of the most dangerous threats to service providers worldwide....

Read More
May 8, 2021

Quo Vadis European Digital Sovereignty?

The Corona crisis has impressively demonstrated the dependence of our modern society on ICT (information and communication technology). The major challenges in climate protection and health, currently especially about the COVID-19 pandemic, can only be solved or supported with trustworthy IT. As digitalization is developing exponentially, it is changing the...

Read More
May 6, 2021

New DDoS classifiers for the DDoS Clearing House

We discuss new algorithms that we have developed to classify the traffic associated with multi-vector DDoS attacks. We have implemented the algorithms in the DDoS Clearing House, a system that enables operations teams across different organisations to collaboratively. Thus prepare for DDoS attacks by automatically sharing DDoS characteristics in the...

Read More
April 29, 2021

DNS Resolvers and DDoS: The Good, the Bad and the Ugly

DNS is one of the core components of the Internet infrastructure, but like any other service on the Internet, DNS is also misused in a set of Cyber attacks, from DNS cache poisoning, to DNS hijacking, to Reflection and Ampli fication (R&A) DDoS attacks. In a DNS-based R&A DDoS attack, DNS...

Read More
April 21, 2021

Using the Data of the CONCORDIA Threat Intelligence Platform for Situational Awareness

To prevail in a situation of increasing incident numbers and sophistication of cyberattacks, it is important to share detailed information about current attacks. As detailed in a previous blog post [1], this task is performed by CONCORDIA's Threat Intelligence Platform consisting of the Incident Clearing House (ICH), a central MISP...

Read More
April 9, 2021

Challenges for Secure and Trustworthy UAS Collaboration

Unoccupied aerial systems (UASs) are receiving growing attention. Thanks to their affordability, their use has been proposed in many domains, including agriculture, oil, gas, electricity utilities, safety, disaster management, and goods transportation. This increased popularity brings new challenges for air traffic management (ATM) and air traffic control (ATC), which are...

Read More
March 19, 2021

Threats, Gaps and Challenges in the Era of COVID-19

COVID-19 has changed the way the world operates, the way we communicate, the mode of doing business and the functioning of governments resulting in an increased reliance over digital technologies and remote working[1]. One effect of this massive digital adoption was an increase in cyberattacks, which demonstrates the urgency and...

Read More
March 12, 2021

Swedish National Cybersecurity Node for Accelerating Innovation and Research in Cybersecurity

CONCORDIA is building cybersecurity Competence Community in Europe, in order to retain and develop the cybersecurity technological and industrial capacities necessary to secure Digital Single Market, increase the competitiveness of the EU cybersecurity industry, and turn cybersecurity into a competitive advantage of other EU industries. Cybersecurity Competence Community is an...

Read More
1 3 4 5 6 7 12