Awareness and Training, Data Security

Home » Marketplace » Awareness and Training, Data Security

Malware & PCAP Feed

LastInfoSec’s "Malware & PCAP Feed" is an access to a set of tests allowing evaluation of the
effectiveness of the intrusion and threat detection solution. It contains malicious files and
pcaps of current or past attacks, which can be used to simulate those attacks for the sole
purpose of testing the intrusion-detection solutions.

Cybersecure gateway and solutions for IoT services

Usable and transparent security suite oriented for smart home systems based on Internet of Things (IoT) use, including all the features and capabilities stated in the GHOST project, as follow:

Ethical Stack

The Ethical Stack is a series of tools to support creators of new connected technology to reflect on their product’s ethical and social impacts.

We approach ethics not only as a way of reflecting on technology but also as a way of building it. Our practical approach to ethics in action is based on three different frameworks: virtue ethics, care ethics and the capabilities approach. Materials and resources are intended to help you understand how our approach can be useful in the development of connected technologies.

Papers and publications of SPECIAL

As a research and development project, SPECIAL offers open access to its publications, which includes scientific papers and presentations, studies and essays, and other dissemination material. All of these are available trough the site linked below.

SPECIAL project deliverables

Find here the public deliverables created in SPECIAL. Our vision is to reconcile Big Data and personal data protection via an innovative data handling solution and a transparency framework. We develop this technology to ease industry’s difficulties with GDPR compliance and to enable respectful treatment of personal information. This introduces new ways of user interaction on data protection, fostering trusted customer relationships. Thus, we
- build a big data architecture to handle linked data for privacy policies, as well as deploy scalable, queryable encryption

CANVAS book

The book The Ethics of Cybersecurity discusses the full plethora of ethical aspects of cybersecurity and has a strong practical focus, including case studies that outline ethical dilemmas in cybersecurity and guidelines and other measures to tackle those dilemmas. The book is published open access and is freely available for everybody.

CANVAS MOOC

The CANVAS Massive Open Online Course (MOOC) transports the main insights of CANVAS to a broad public. In particular, the MOOC provides a comprehensive overview of the central principles and challenges in the fields of cyber security, privacy and trust. Concrete case studies from health, business and national security spheres are presented. Technical, legal and ethical perspectives on the issues are included.

CANVAS Reference Curriculum

The CANVAS Reference Curriculum integrates the value perspective into cybersecurity design decisions, with a focus on academia and industry training programs. It contains an overview document outlining the structure of the curriculum, for each lecture a content descriptor (summary, learning goals, freely available presentation slides, literature and videos) and nine case study documents (1 page descriptor; 2 page example solution). It has been developed upon the basis of the identification of good practices of teaching ethics, responsible science, technology and engineering

CANVAS briefing packages

The CANVAS Briefing Packages are a set of summarized, easily digestible information on challenges as well as possible, value-driven solution approaches linked to European cybersecurity policy. Addressing mainly (but not exclusively) EU and national policy makers, they provide guidance for decisions in this area. They discuss the following challenges: 1) Achieving Trust in EU Cybersecurity. 2) Cybersecurity and the European Data Protection Framework. 3) All Fundamental Rights are relevant for Cybersecurity.

WITDOM Protection Orchestrator

The Protection Orchestrator (PO) coordinates several protection components and services in order to effectively protect data before they leave a trusted environment for processing or storing reasons. The PO is in charge of parsing the protection configuration of an application and applying it. This is done by building requests to Protection Components deployed in the trusted domain and calling them for protecting the input data that a service in the untrusted domain will need, or for unprotecting the results after a service in the untrusted domain has processed them.

Pages

News

CyberSolace, has added a new niche capability to its portfolio of cybersecurity consulting services in the form of Crypto-Currency traceability services in Cybercrime cases.  Especially in relation to ransomware attacks and extorted funds tracing and recoverability.

Future Events

As Europe’s largest legal technology conference and exhibition, The British Legal Technology Forum 2020 will bring together the most respected professionals from both the legal and commercial technology sectors to examine and explore the systems, strategies, processes and platforms that will drive law firms and legal businesses into the next decade and beyond.

10/03/2020

This webinar gives key advice to improve your project market readiness by sharing tips and best practices from three H2020 projects that are an example of advanced market preparation. SMESEC is going to be one of them.

11/03/2020