April 9, 2021

Challenges for Secure and Trustworthy UAS Collaboration

Unoccupied aerial systems (UASs) are receiving growing attention. Thanks to their affordability, their use has been proposed in many domains, including agriculture, oil, gas, electricity utilities, safety, disaster management, and goods transportation. This increased popularity brings new challenges for air traffic management (ATM) and air traffic control (ATC), which are...

Read More
March 19, 2021

Threats, Gaps and Challenges in the Era of COVID-19

COVID-19 has changed the way the world operates, the way we communicate, the mode of doing business and the functioning of governments resulting in an increased reliance over digital technologies and remote working[1]. One effect of this massive digital adoption was an increase in cyberattacks, which demonstrates the urgency and...

Read More
March 12, 2021

Swedish National Cybersecurity Node for Accelerating Innovation and Research in Cybersecurity

CONCORDIA is building cybersecurity Competence Community in Europe, in order to retain and develop the cybersecurity technological and industrial capacities necessary to secure Digital Single Market, increase the competitiveness of the EU cybersecurity industry, and turn cybersecurity into a competitive advantage of other EU industries. Cybersecurity Competence Community is an...

Read More
March 8, 2021

Women in Science, ICT and Cybersecurity

In 2015, 17 goals were adopted by the United Nations (UN) member states as a part of the 2030 Agenda for Sustainable Development Goals (SDGs) to cover the 15-year plan. Achieving gender equality and empower all women and girls is goal number 5 in the beforementioned agenda.[1] Over the past...

Read More
February 26, 2021

Securing Eletric Mobility Charging Networks

H2020 Concordia work package 2 is composed by 4x Sector-Specific Pilots: Task T2.1: Telecom Sector Task T2.2: Finance Sector Task T2.3: Transport E-Mobility Sector Task T2.4: e-Heath Sector Related with T2.3 CRF and EFACEC are working together on a pilot project focused on the Security of the e-Charging Infrastructure. Nowadays...

Read More
February 18, 2021

CONCORDIA Start-up Community: Where do we find the greatest hits of EU cybersecurity new wave?

We are getting closer and closer to accomplish the objective of pooling Europe's Cybersecurity expertise and implementing European Cybersecurity Competence Centre and Network. The new structure described in the legislative proposal would support all types of cybersecurity stakeholders, but there should be a special attention for start-ups. Nature of cybersecurity...

Read More
February 3, 2021

Smart Home and remote health services

Health services in the European Economic Area (EEA) address many stakeholder, like round 1.8 million health professionals and 7.3 million nurses and midwives, working in thousands of hospitals and clinics in 27 Member States (MS). EEA counts 500+ million citizens and with this, potential patients. A huge IT-system is need...

Read More
January 27, 2021

A new method to detect exploitable smart-home devices connected behind a NAT

Instead of relying on customers to protect their vulnerable smart home devices from being used in cyberattacks, Ben-Gurion University of the Negev (BGU) researchers who participate in CONCORDIA have developed a new method that enables telecommunications and internet service providers to monitor these devices. According to their new study, the...

Read More
January 21, 2021

The impact of State–sponsored Trolls during the 2016 US Presidential Election Discourse

It is a widely accepted fact that state-sponsored Twitter accounts operated during the 2016 US presidential election, spreading millions of tweets with misinformation and inflammatory political content. Whether these social media campaigns of the so–called "troll" accounts were able to manipulate public opinion is still in question. In this post...

Read More
January 13, 2021

A novel Cybersecurity Maturity Assessment Framework (CMAF)

As organizations, and especially Critical National Infrastructures (CNI), are becoming more vulnerable to cyber-attacks, their protection becomes essential and a lifecycle model of prediction, protection, detection and reaction is considered necessary. Towards this target, assessments help identify the strengths and weaknesses of an organization’s processes and procedures and examine how...

Read More
1 4 5 6 7 8 12