July 2, 2020

COVID-19, Telecommuting and Threat Intelligence

How threat actors are abusing the global pandemics In response to the COVID-19 pandemic, organisations around the world decide to adopt telecommuting. With the communication increasing due to working from home policies, threat actors are taking advantage and are even using the novel coronavirus as a lure to mount attacks....

Read More
June 25, 2020

Securing the sky

Unoccupied aerial systems (UAS) - colloquially referred to as ‘drones’ - are increasingly being deployed for a plethora of military and civil applications as well as for entertainment. This is a major challenge for the defence and aeronautical industry, as those vehicles need to be integrated into an already congested...

Read More
June 18, 2020

Boosting the CONCORDIA’s Cyber Security Ecosystem: Virtual Lab, Services and Training

Several activities within CONCORDIA build and improve trusted ecosystems with the goal to provide impact and sustainability for communities. Besides Threat Intelligence Platform and House for DDoS Attacks, CONCORDIA‘s ecosystem has this focus by providing lab infrastructures, services, and training. As CONCORDIA takes a holistic and scalable approach to cyber...

Read More
June 11, 2020

Securing Machine Learning

The advancements in Artificial Intelligence and machine learning have produced a drastic change in the organization of many systems, services, and the society itself. Machine learning has become one of the main components for many systems and applications that leverage the huge amount of data collected from many different sources,...

Read More
June 4, 2020

How to build a Next Generation Intrusion Detection System: Who has the answer?

Stand of the art approaches to detect malware in networks are based on detecting them by an analysis of pattern in a network stream. But what is, if the malware has slipped through all security controls, uses encryption and is commanded and controlled by a human or artificial intelligence? Next...

Read More
May 28, 2020

Cybersecurity in the financial sector: knowing your enemy

The financial sector is one of the most critical and sensitive sectors. Cybercriminals look to exploit it for large amounts of money and financial information. The attacks range from exploiting any vulnerability (digital or physical) to take profit by means of extortion, theft, fraud and impersonation. Moreover, the financial sector...

Read More
May 20, 2020

The causal loops of online trust, user behavior and misinformation

From establishing simple connections online, through enabling e-commerce and risky transactions, to conducting online voting, trust has come to serve the online communities the very same purpose it serves the traditional world: facilitator of our online presence and interactions, of community building and, ultimately, enabler of democracy. In contrast, misinformation...

Read More
May 14, 2020

A few words about EuroSec2020

One of the targets of CONCORDIA is to build a European Secured, Resilient and Trusted Networked Ecosystem and also create and promote excellent academic research, as well as producing excellent papers for scientific journals, conferences and workshops. Within this context CONCORDIA also supports a number of conferences and workshops by...

Read More
May 7, 2020

Enhancing Hardware Security in IoT/Embedded Systems

In an ever-expanding and fully connected world of device-centric solutions, a significant amount of IoT/Embedded systems has been deployed in a plethora of environments. This adaptation of the recent advancements of the technological field in Embedded systems these recent years can be evaluated as quite hasty, focusing mainly on performance...

Read More
April 30, 2020

Covid-19 crisis and cybersecurity: Transforming the threat to an opportunity

In our more-than-ever interconnected world, we are quite aware that cyber crises cannot be contained in one’s borders, and there is a similar case with this health-related crisis. Day by day, it becomes obvious that dealing with the covid-19 crisis, follows the same lifecycle as dealing with a cyber crisis...

Read More