Blog

CONCORDIA Blog

November 25, 2021

CONCORDIA’s Incident Clearing House: a Closer Look

In this blog post we are going to have a closer look at one of the core components of CONCORDIA's Threat Intelligence Platform: the Incident Clearing House. What does it do? How does it work? And how does it integrate with the other platform components? A Core Component The Incident...

Read More
November 18, 2021

The long-standing problem of email attacks

For several years now, the digital revolution has radically changed people's daily lives, both their private and work lives. The use of the Internet and its services has become indispensable for interaction between people and a priority for all companies that want to remain competitive on the market. Although digitalization...

Read More
November 11, 2021

The market for lemons on the market for ideas

In a previous blog post i explained the link between trust, misinformation and user behavior. Two major points follow from that text: The first is that trust is an invisible enabler of the socio-technical interactions within a system, whereas misinformation (or information disorder/pollution in general) is a tangible disabler of...

Read More
November 4, 2021

Developing and running a testbed for the DDoS Clearing House

Demonstrating the DDoS Clearing House in a representative simulated environment Authors: Thijs van den Hout (1), Remco Poortinga - van Wijnen (2), Cristian Hesselman (1, 3), Christos Papachristos (4), Karin Vink (1) SIDN, the Netherlands SURF, the Netherlands University of Twente, the Netherlands FORTH, Greece We have created a distributed...

Read More
October 26, 2021

Cybersecurity Roadmap for Europe by CONCORDIA

All future global market-dominant products and services will likely be located in the digital world, in cyberspace, or at least interact strongly with it. Cybersecurity is the pillar of the digital society and the guarantee of trust and cooperation. Therefore, cybersecurity and its roadmap cannot be analysed only from a...

Read More
October 8, 2021

QUIC protocol from the monitoring perspective

The goal of this document is to describe a network protocol QUIC from the perspective of network monitoring. Compared to the existing protocols, QUIC has several differences that we encountered when trying to monitor it. In addition to the description of the protocol, the article contains information from measuring the...

Read More
September 22, 2021

On Customer Side Cloud Security

Cloud computing encapsulates IT resources to be delivered as services over the network. As a result, Cloud customers can purchase and configure Cloud services on-demand with minimal expenses or management overhead. In spite of the benefits, Cloud systems are susceptible to a variety of security issues, e.g., unauthorized accesses or...

Read More
September 15, 2021

CONCORDIA’s Cyber Security Ecosystem: Virtual Lab, Services and Training

Several activities within CONCORDIA build and improve trusted ecosystems with the goal to provide impact and sustainability for communities. Besides Threat Intelligence Platform and DDoS Clearing House, CONCORDIA‘s ecosystem has this focus by providing lab infrastructures, services, and training. As CONCORDIA takes a holistic and scalable approach to cyber security,...

Read More
September 10, 2021

Creating trust through blockchain?

Ten years after the Bitcoin whitepaper was published, the term "blockchain" is still primarily associated with cryptocurrencies. Rightly so, one might say, as the added value is inextricably linked to the underlying data structure of Bitcoin. However, there is also an increase in the number of voices pursuing the use...

Read More
September 2, 2021

The endless identity problem

Identities in the digital world A quick search online, about the definitions of “identity” and “identity management (IdM)” reveals an underlying issue about the relation of these terms in the digital world. We see that the first one defines identity as “the distinguishing character or personality of an individual” [1][2][3]...

Read More
1 3 4 5 6 7 14