Blog

Procedural Aspects of an Impact Assessment for Innovative Cybersecurity Systems Research: The Cyber-Trust model

Olga Gkotsopoulou, Research Group on Law, Science, Technology and Society, Vrije Universiteit Brussel  The H2020 Cyber-Trust project (agreement No 786698) aims to foster a holistic and novel cyber-threat intelligence gathering, prevention, detection and mitigation platform, to secure the complex and ever-growing smart infrastructure, used by millions of people daily. The project consortium follows the latest technical innovations as well as best practice in the field, observing developments in the applicable legal and regulatory framework and investigating other ethical and societal…

0
Read More

The Choice of Architecture Methodology in the Design of the CyberTrust System

CGI, October 2020 At the time when the project CyberTrust is progressing towards the implementation of the pilots, it’s timely to talk about the architecture methodology chosen by the consortium of the project CyberTrust which is the backbone of the technological platform has been built. Important interim validated outcome is that the CyberTrust architecture is robust and resilient. The conclusive outcomes will be reported when the pilots are completed. Architecture in the digital world is not just a good idea;…

0
Read More

The ever-evolving IoT landscape: Blessing or Curse?

The ever-evolving IoT landscape: Blessing or Curse? Vasiliki-Georgia Bilali, Antonia Kardara, Dimitrios Kavallieros, George Kokkinis IoT landscape is ever-evolving, influenced mutually (or both) from technological and social needs. IoT applications are evolving as the technological services and products are updated and different industry tendencies and policies are applied. This perpetual evolution emerges from the need to automate, facilitate, and enhance daily routines and operational processes. The long-term goal is to provide technological innovation to users/experts and operational innovation in targeted…

0
Read More

Blockchain solutions and chain-of-custody

Sotirios Brotsis, Nicholas Kolokotronis, 5 July 2020 The technological evolution, which is derived from the development of the Internet of things (IoT) is accompanied by new forms of cyber-attacks that exploit the heterogeneity of IoT ecosystems and the existence of vulnerabilities in IoT devices. Thus, the detection of attacked IoT devices, as well as, the accumulation and maintenance of forensic evidences emerge as areas of immense priority [1, 4]. Most of the IoT devices are highly resource-constrained, while their computational…

0
Read More

Data visualisation for Zero-Day malware detection

Gueltoum Bendiab, Stavros Shiaeles, 29 Jun 2020. Malware is today one of the major threats faced by the digital world. In particular, the modern malware attacks have drawn special attention to the extensive damage that can be caused to private users, companies, public services, governments, and critical infrastructures, which provide vital functions that our societies depend upon. According to the AV-TEST institute, AV-TEST analysis systems recordover 350,000 new malicious programs every day, which amounts to more than 200 million pieces…

0
Read More

Cyber-Trust co-organises the webinar ‘The Promise of “Blockchain”: DLT-based applications re-shape data storage and sharing, but can they be compliant with the EU data protection law?’

On 18 June 2020, the Brussels Privacy Hub and the Health and Ageing Law Lab (HALL)  in synergy with the Horizon 2020-funded research projects: Cyber-Trust| Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things, FASTER| First responder Advanced technologies for Safe and efficienT Emergency Response, and LOCARD | Lawful evidence collecting and continuity platform development present the panel ‘The Promise of “Blockchain”: DLT-based applications re-shape data storage and sharing, but can they be compliant with the…

0
Read More

COVID-19: Amid a “pandemic” of cyber-attacks

A Cyber-Trust Brief by Olga Gkotsopoulou, VUB Even though companies have become more resilient over time, studies show that cyber-attacks have evolved and have become even more frequent [i]. This is more so true, especially in times of emergency and disaster at a national or global level. Since the beginning of the COVID-19 outbreak which led in an increase in the number of people staying at home and the turn into digital services, a significant upsurge has been noted in…

0
Read More

AI for the future of prevention, detection and mitigation of cyberattacks: what is at stake for privacy and data protection?

On 23th January 2020, Cyber-Trust organised the panel “AI for the future of prevention, detection and mitigation of cyberattacks: what is at stake for privacy and data protection?” in the annual Computers, Privacy and Data Protection (CPDP) conference, in Brussels. The conference is one of the major data protection and privacy conferences in the world, gathering more than 1000 experts from Europe and overseas. The Cyber-Trust panel, chaired by the Vrije Universiteit Brussel (VUB) and with the participation of the…

0
Read More

Co-organising Mediterranean Security Event 2019 Crete, Greece

Cyber-Trust is co-organiser of the Mediterranean Security Event 2019. MSE2019, chaired by the Center for Security Studies (KEMEA) of the Greek Ministry of Citizen Protection, is the largest event of the year, which is collaboratively organized by the community of Security R&D stakeholders in the European Union. The event takes place in Crete at the Fodele Beach Hotel between the 29th to the 31st of October 2019. The MSE2019 is a joint initiative of thirty-six EU funded R&D projects supported…

0
Read More

This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 786698. The content of this website does not represent the opinion of the European Union, and the European Union is not responsible for any use that might be made of such content. Therefore, any communication activity related to the action reflects only the author’s view and the European Commission is not responsible for any use that may be made of the information it contains.

Data Protection Policy

Legal Notice

Archives