CONCORDIA Blog
Let’s talk about Education in cyber
Be part of the European Education Ecosystem for Cybersecurity. Are you a professional providing cybersecurity related services, a Chief Technology Officer, an HR representative, a mid-manager, or a cybersecurity professional working in a company? Get involved in shaping the certification framework for cybersecurity skills and in developing relevant courses for...
Read MoreCONCORDIA visiting patients at Smart Home
Are our homes becoming smart homes in the near future? Are hospitals and patient care moving to our homes soon? Innovation means different things to different people, depending on the context in which it is being reviewed. This blog reviews the emerging concept for new values for cybersecurity in Europe...
Read More“Cyber Threat Intelligence”: what should I share?
Try to look for it; it is not going to be easy. Searching a good definition of “Cyber Threat Intelligence” (CTI) is one of those activities that can easily go on for hours without obtaining a fully satisfying result. This holds true not just for single experts and academic researchers,...
Read MoreSecurity Playbook Automation through CONCORDIA
The ability to quickly identify and understand the nature of cyber threats as they emerge, but also acting with agility in applying effective cyber controls to prevent and respond to continuously evolving cyberattacks is of undeniable importance. As the typical time an attacker needs from the initial compromise to complete...
Read MoreImproving Quality Assurance and Situational Awareness for CONCORDIA’s incident clearing house
CONCORDIA aims to build a threat intelligence platform that facilitates cross-sector sharing of actionable information on imminent or already successful attacks on your networks. But besides simply informing you in case of already successful attacks, there is more that can be done with this information if you look more closely....
Read MoreCybersecurity threats: trends
Driven by digitalization, information sharing has been experiencing an exponential growth in the past few years. In turn, one’s eagerness to better prepare and protect depends on the ability to change the attitude from “need to know” to “need to share”. Digital technologies, most notably Artificial Intelligence (AI), have shaped...
Read MoreFast, interoperable and secure mobile network made in Switzerland
Is it possible to combine programmability, centralized control, robustness and adaptability in one network control protocol, in order to establish a reliable network of mobile nodes? RUAG provides comprehensive advice and state-of-the-art products and services for security-critical environments. As a vendor-neutral full-service partner RUAG provides tailored solutions and services to...
Read MoreAssessing blockchains’ network infrastructure: why it matters for cybersecurity
Blockchain got a tremendous attention in the last few years and is considered as a disruptive technology able to redefine the collaborative processes in many activity domains including the cybersecurity. The billions of assets exchanged on a daily basis by public blockchains make them a new and attractive target for...
Read MoreCODE CTF 2019 The 5th Element
2019 is the year when worlds collide. It was the pleasure of RI CODE, ITIS e.V., and Team localos to fight together with the participating teams against the darkness during the Capture the Flag (CTF) 2019 „The 5th Element – It mu5t be found“. The fifth CTF started on 22nd...
Read MoreTowards Context-based Vulnerability Analysis & Inference Lancaster University
Over the last decade, a conspicuous increase in the number of vulnerabilities coupled with a paucity of detailed information about them has hindered qualified vulnerability analysis, and consequently, resulted in multiple outstanding vulnerabilities in the wild. Fig. 1 illustrates the number of vulnerabilities reported in 2019. For instance, in January...
Read More