CyberSANE at the Concordia Open Door Event 2021

Updated 30th September 2021 The 20th and 21st October 2021, CyberSANE will once again participate in CONCORDIA’s Open Door 2021 virtual event. CyberSANE will hold a virtual-exhibitor stand to present the project to industry specialists and other event participants. Interested in our presentation from COD2020? Then check out our previous…

Continue reading

CyberSANE at CyberHOT Summer School 2021

Updated 30th September 2021 On the 27th and 28th September 2021, the CyberSANE participated in the CyberHOT Summer School. Furthermore, CyberSANE also sponsored this event providing both content and speakers, thus supporting the sharing of cyber security related knowledge, helping them to respond and combat anything that they may encounter.…

Continue reading

Newsletter #3 – September 2021

The third edition of CyberSANE’s biannual newsletter is now available. Find out what has transpired since our last newsletter : project updates, participation in events, as well as our new technical blog post series! Don’t forget, if you are also curious about the people behind CyberSANE, then you can also…

Continue reading

CyberSANE at ARES 2021

Updated 17th May 2022 From the 17th to the 20th August 2021, CyberSANE participated in the all digital 16th International Conference on Availability, Reliability and Security (ARES 2021). During this event, CyberSANE was presented by our very own Quality Assurance Manager, Manos Athanatos from FORTH. The presentation took place on…

Continue reading

CyberSANE recognised by EU Innovation Radar

Updated 16th July 2021 CyberSANE is delighted to share that some of the innovations developed during the project have been analysed and identified by the European Commission’s Innovation Radar. Furthermore, their analysis also identified the different partners deemed “Key Innovator’s” in the development of each innovation. Congratulations to all listed…

Continue reading

How to efficiently detect suspicious cyber activities? Encrypted Network Traffic Analysis and Transformation and Normalization techniques

The adoption of network encryption is rapidly growing. Global HTTPS page loads have increased to more than 80%. Even though network encryption is crucial for the protection of users and their privacy, network encryption introduces challenges for systems that perform deep packet inspection and rely heavily on the processing of…

Continue reading