CONCORDIA Blog
CONCORDIA’s Incident Clearing House: a Closer Look
In this blog post we are going to have a closer look at one of the core components of CONCORDIA's Threat Intelligence Platform: the Incident Clearing House. What does it do? How does it work? And how does it integrate with the other platform components? A Core Component The Incident...
Read MoreThe long-standing problem of email attacks
For several years now, the digital revolution has radically changed people's daily lives, both their private and work lives. The use of the Internet and its services has become indispensable for interaction between people and a priority for all companies that want to remain competitive on the market. Although digitalization...
Read MoreThe market for lemons on the market for ideas
In a previous blog post i explained the link between trust, misinformation and user behavior. Two major points follow from that text: The first is that trust is an invisible enabler of the socio-technical interactions within a system, whereas misinformation (or information disorder/pollution in general) is a tangible disabler of...
Read MoreDeveloping and running a testbed for the DDoS Clearing House
Demonstrating the DDoS Clearing House in a representative simulated environment Authors: Thijs van den Hout (1), Remco Poortinga - van Wijnen (2), Cristian Hesselman (1, 3), Christos Papachristos (4), Karin Vink (1) SIDN, the Netherlands SURF, the Netherlands University of Twente, the Netherlands FORTH, Greece We have created a distributed...
Read MoreCybersecurity Roadmap for Europe by CONCORDIA
All future global market-dominant products and services will likely be located in the digital world, in cyberspace, or at least interact strongly with it. Cybersecurity is the pillar of the digital society and the guarantee of trust and cooperation. Therefore, cybersecurity and its roadmap cannot be analysed only from a...
Read MoreQUIC protocol from the monitoring perspective
The goal of this document is to describe a network protocol QUIC from the perspective of network monitoring. Compared to the existing protocols, QUIC has several differences that we encountered when trying to monitor it. In addition to the description of the protocol, the article contains information from measuring the...
Read MoreOn Customer Side Cloud Security
Cloud computing encapsulates IT resources to be delivered as services over the network. As a result, Cloud customers can purchase and configure Cloud services on-demand with minimal expenses or management overhead. In spite of the benefits, Cloud systems are susceptible to a variety of security issues, e.g., unauthorized accesses or...
Read MoreCONCORDIA’s Cyber Security Ecosystem: Virtual Lab, Services and Training
Several activities within CONCORDIA build and improve trusted ecosystems with the goal to provide impact and sustainability for communities. Besides Threat Intelligence Platform and DDoS Clearing House, CONCORDIA‘s ecosystem has this focus by providing lab infrastructures, services, and training. As CONCORDIA takes a holistic and scalable approach to cyber security,...
Read MoreCreating trust through blockchain?
Ten years after the Bitcoin whitepaper was published, the term "blockchain" is still primarily associated with cryptocurrencies. Rightly so, one might say, as the added value is inextricably linked to the underlying data structure of Bitcoin. However, there is also an increase in the number of voices pursuing the use...
Read MoreThe endless identity problem
Identities in the digital world A quick search online, about the definitions of “identity” and “identity management (IdM)” reveals an underlying issue about the relation of these terms in the digital world. We see that the first one defines identity as “the distinguishing character or personality of an individual” [1][2][3]...
Read More