Home » News

News

Filter the news and events here. Use CTRL + click for multiple selections and unselections

What is smishing, and how to protect yourself against it?

Have you ever received an SMS to your smartphone that asked you to follow a link for more information? It could be a delivery notice from an online store or postal service, or a notification of a new voicemail. Maybe the SMS seemed a bit off, and you might have wondered whether you should click the link or not. But you wanted to know where your parcel is or who left a message, so you went on and clicked it anyway.

CONCORDIA Map 2.0

It’s been more than two years since we have launched the CONCORDIA map displaying short courses and trainings for cybersecurity professionals.
The map is complementing the ENISA database of university related programs, and aims at showcasing in a structured way relevant content from all over Europe, thus contributing to building a European Education Ecosystem for Cybersecurity.

We are now coming back to you with great news. The CONCORDIA courses map was revamped and includes new features for the benefit of both the end users such as corporates, SME/startups, specialized organizations, individuals, and the course providers.

Research category winners in CONCORDIA WOMEN’s AWARDS

We already know CONCORDIA WOMEN’s AWARDS winners for the RESEARCH category! CONCORDIA has established the WOMEN’s AWARDs to recognize outstanding women working in cybersecurity and privacy, encourage young females to continue pursuing their careers in cybersecurity.

The CODE 2021: Secure supply chains for digital sovereignty?

The pandemic has shown the importance of international supply chains and how dependent we are. Attacks in the virtual space may have an increasing impact on supplies in our analogue world. Reason enough for the Research Institute CODE (RI CODE) of the Universität der Bundeswehr München (UniBw M) to dedicate its annual conference “CODE 2021” to the theme “Supply Chain Sovereignty: Reality or Illusion?” and invite experts to look at the topic from different perspectives.

Are you ready for the challenge? Join our M-Sec Online Contest by 26 August

Do you have an innovative business idea that addresses one of M-Sec’s smart city challenges? Are you interested in security and privacy issues of IoT devices and apps? Then apply by 26 August, participate at the M-Sec Online Contest between 9 and 10 September and get the chance to design, develop and present your business idea before a panel of international experts

CONCORDIA’s Sector-specific Pilots – the basics

 

The collaboration between the academic and industrial community, where the research provides solutions for the identified industrial use cases, is organized in CONCORDIA’s work package by developing the so-called pilots. CONCORDIA is addressing industrial challenges in seven pilots – five sector-specific and two cross-sector pilots.

In CONCORDIA, we focus on the five sector-specific pilots, which are:

Happy birthday, GEIGER!

A year ago, we had a vision of a cybersecurity solution tailored for the needs and resources of small businesses, and a team of enthusiastic people from nine European countries ready and determined to tackle the challenges ahead. Since then, we studied in detail five diverse small businesses and talked to many more of them. Today, we have an impactful vision. We have designed a motivating approach to cybersecurity, and developed the first GEIGER prototype!

M-Sec EU & Japanese IoT citizens and stakeholders’ consultation preliminary results

At the end of 2020, the M-Sec Project launched a survey to the European and Japanese IoT community, to better understand their experience when using IoT devices and applications and on their knowledge of EU & Japan’s data protection regulations. 6 months after, and with more than 450 answers, here are the first insights from our community

Roadmap for the 1st CONCORDIA Cybersecurity Skills Certification Scheme

The subject of Cybersecurity skills and the relevant persisting gap1 has allowed a variety of cybersecurity courses and certification schemes to arise2. In each case, the certification scheme owners have decided upon an implementation method based on their experience, practice and beliefs. But which one is the most suitable for evaluating and validating cybersecurity skills?

Pages

News

On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.