About CS-AWARE

This author has not yet filled in any details.
So far CS-AWARE has created 176 blog entries.

A quantitative evaluation of trust in the quality of cyber threat intelligence sources

14th International Conference on Availability, Reliability and Security (ARES 2019) - Canterbury, United Kingdom, 26–29 August 2019 Thomas Schaberreiter, Veronika Kupfersberger, Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Christos Ilioudis, and Gerald Quirchmayr https://phaidra.univie.ac.at/o:1076811

2021-02-12T22:06:14+00:00August 29th, 2019|Papers|

Identifying Cybersecurity Anomalies with Risk Potential

When aiming to monitor an organization’s security 24/7, apart from breaches and attacks that are detected by existing tools, IT security specialists are interested in potential anomalies that seem transitory within IT systems. Sometimes such anomalies are just a random occurrence of multiple factors due to a pure technical set-up; other times they may have [...]

2019-10-03T14:36:54+00:00August 23rd, 2019|Blog|

System dependency workshop in Larissa and Rome – Context and procedures

In October this year we concluded the third round of a series of three one week long systems and dependency analysis workshops. A one week long workshop was held in Larissa and in Rome, with the purpose of identifying potentially malicious behaviour within the services we are monitoring within the CS-AWARE pilot, and how this [...]

2019-11-22T09:19:45+00:00July 19th, 2019|Blog|

Who does my Android phone tell about me? Looking at the BLOKADA log file

Blokada is a program, which sets itself up as a VPN. Think of a VPN like a street your data passes through before entering the highway of the Internet. Blokada looks for traffic to and from addresses related to advertising and tracking in general. When it finds such, it tells Android that this address is [...]

2019-06-26T09:49:43+00:00June 26th, 2019|Blog|

InnoSec presents CS-AWARE in the FOSSCOMM 2018 conference

InnoSec participated in the FOSSCOMM (Free and Open Source Software Communities Meeting) 2018 conference that took place on Crete island, Greece between the 13th and 14th of October 2018. FOSSCOMM is the Panhellenic conference of free and open source software communities, where several open-source software communities participated in it, including the Hellenic Linux User Group [...]

2019-06-06T07:58:39+00:00June 6th, 2019|Blog|

The market for cybersecurity is very active

The market for cybersecurity is currently very active, and especially companies that are providing services in the detection and reaction phases of the cybersecurity cycle are a hot commodity right now. According to a recent article in TechCrunch, within one week 4 cybersecurity companies were sold for a total of 1.5 Billion Dollar. So there [...]

2019-06-06T07:54:47+00:00June 6th, 2019|Blog|

A Cybersecurity Situational Awareness and Information-Sharing Solution for Local Public Administrations based on Advanced Big Data Analysis: The CS-AWARE Project, Challenges in Cybersecurity and Privacy – the European Research Landscape

RIVER PUBLISHERS SERIES IN SECURITY AND DIGITAL FORENSICS In this chapter, the EU-H2020 project CS-AWARE (running from 2017 to 2020) is presented. CS-AWARE proposes a cybersecurity awareness solution for local public administrations (LPAs) in line with the currently developing European legislatory cybersecurity framework. CS-AWARE aims to increase the automation of cybersecurity awareness approaches, [...]

2021-02-12T22:07:53+00:00June 1st, 2019|Papers|

Sigma language rules for SIEM

Motivated by the sudden growth of interest in Security Information and Event Management (SIEM)mechanisms worldwide, companies that develop cybersecurity products started building their own SIEMsolutions as soon as possible. Due to market share competition, each of these companies developedtheir own proprietary security rules formats and built their analysis engines to work best with thesespecific formats.Soon [...]

2020-10-12T10:09:30+00:00May 31st, 2019|Blog|

A skeptical view…

Just a thought, as we look at other possible competitors, etc. in cybersecurity, it’s best not to forget and keep a skeptical view of many “commercial” claims. Read –and enjoy! – this latest report from ProPublica, an independent and nonprofit newsroom that produces investigative journalism. In few words: companies that promised to beat ransomware with [...]

2019-05-21T09:27:35+00:00May 21st, 2019|Blog|

B as Baltimore (or Brussels…)

Sometimes we also ourselves think if what we are building in the CS-AWARE project is really useful and what someone may consider as “bare necessities” for a local public administration, or only some forward-looking, nice-to-have “stuff” which may better be described as a solution-in-search-of-a-problem. And then we read something like this here: A ransomware attack [...]

2019-05-20T13:23:13+00:00May 20th, 2019|Blog|
Go to Top