CONCORDIA Blog
Cybersecurity: Why adopting Gorille® in your EDR?
The aim of this blog post is to present the result of our work and our innovative technology tested within the European consortium Concordia and explain how our Gorille® morphological analysis solution can detect, identify and analyze any malware. When it comes to cybersecurity, using an EDR has become a...
Read MoreEthereum’s P2P network monitoring and Sybil Attack Prevention
In our previous blog post “Assessing blockchains’ network infrastructure: why it matters for cybersecurity”, we motivated why the monitoring of blockchains’ underlying P2P network is critical to evaluate network properties impacting their resiliency and to detect suspicious nodes that can threaten the proper functioning of the P2P network, for instance...
Read MorePush the button: Our updated DDoS testbed in action at CONCORDIA Open Door 2022
In one of our previous blogs, we introduced the testbed we developed for the DDoS Clearing House and described how we used it to pilot the system in a realistic environment. Over the past months, we have improved the testbed and will demonstrate it working as part of the CONCORDIA...
Read MoreCONCORDIA and Cyber Diplomacy
In the scope of community building activities, CONCORDIA project established cooperation with EU Cyber Direct project that supports EU cyber diplomacy and international digital engagements. The EU Cyber Direct – EU Cyber Diplomacy Initiative is funded by the Service for Foreign Policy Instruments (FPI) at the European Commission. The project...
Read MoreKYPO cyber range platform: technology & education
Several activities within CONCORDIA build and improve trusted ecosystems with the goal to provide impact and sustainability for communities. Besides Threat Intelligence Platform and DDoS Clearing House, CONCORDIA‘s ecosystem has this focus by providing lab infrastructures, services, and training. In today`s blog post, we will focus on the training part....
Read MoreAn experience of becoming a Certified Cybersecurity Consultant (C3 by CONCORDIA)
Within the CONCORDIA project, C3 by CONCORDIA certification was developed for European cybersecurity professionals who want to have their knowledge and skills validated with a certificate. In this blog post, I will describe my experience of how I gained the certificate, and I hope it could help someone else with...
Read MoreNew shape of health care with Edge devices
Edge computing has been one of the key digital transformations in the last year and it is reshaping health care by bringing medicine into a new direction. Bringing big data processing and storage closer to the source helps to better analyse and collect data as well as improving the accuracy...
Read MoreTowards an integrated platform for skills in cyber built on the European Cybersecurity Skills Framework
Difficult to understand the trainings big picture The needs to protect oneself against threats to information and operations, to maintain the cybersecurity posture of an organization and to increase the resilience against such threats, are still urgently felt by all interested parties. A core component to fulfilling these needs, is...
Read MoreOn the Security Assessment of the Cloud
A plethora of highly effective Threat Analysis (TA) techniques exist that focus on analyzing threats to specifically targeted assets (e.g., components, services), typically considering static interconnections among them. On the other hand, the Cloud is a dynamic environment where resources can instantiate or migrate to provide rapid scalability to the...
Read MoreThe ethical contextualization of trust
In the blog series I presented here [1][2], I tried to establish the connection between the human/user behavior and the online trustworthiness of systems, products, people, places, information… I also pointed out the various ways in which system designers try to address trust-related issues, the constrained context in which this...
Read More