SpartaNews
APProver tool: providing a security evaluation of apps
22nd Apr 2021
The APProver tool aims at providing a security evaluation of apps embedded in smartphones, to verify compliance with security policies and do not include malware.More >>
SPARTA CAPE tool: detecting and mitigating side-channel vulnerabilities
18th Apr 2021
This SPARTA tool, developed within CAPE program, aims at detecting and mitigating side-channel vulnerabilities, attacks that have significantly risen with the publication of SPECTRE or MELTDOWN, and are particularly difficult to handle.More >>
Evaluating the security of the open-source software supply chain
12th Apr 2021
This flyer presents a series of tools aiming at evaluating the security of the open-source software supply chain. More specifically, we provide tools to evaluate the consequences of vulnerabilities in open source libraries on the applications that use themMore >>
Security of e-government applications: how to evaluate the impact of vulnerabilities in complex software systems, including significant open source components
12th Apr 2021
More >>
Curricula Designer: a tool that connects education providers with cybersecurity job market
7th Apr 2021
The SPARTA Cybersecurity Training and Awareness team launched the Curricula Designer, a tool that connects education providers with cybersecurity job market.What it does?
The Curricula Designer is a simple free web-based application that helps education and training providers to design cybersecurity curricula that reflect needs of current job market. By the ability to precisely select the content of courses and see the impact of training components on gained competence, curricula administr...
More >>
Securing the connected vehicle: attacks and defenses against platooning vehicles
5th Apr 2021
This demonstration showcases how SPARTA can certify blocking classes of attacks in connected cars.More >>
Hunting for a malicious code among add-ons (article)
31st Mar 2021
Author: Edvard RejtharTranslation: Petra Raszková
Original (CZ) version available at: https://blog.nic.cz/2020/11/19/hledani-skodliveho-kodu-mezi-doplnky/
How to catch a malicious add-on with “its” trousers down?
I identified the computer´s non-standard behavior, so I looked at add-ons to find out its source, and I came across the innocent-looking source code which lines are responsible for this behaviour. Here is a jotting from a malware hunt. A few days ago, I noticed that a certain si...
More >>
Effective training in cybersecurity in the new era of staff remotisation: Practical solutions, tools & opportunities
15th Mar 2021
SPARTA will be part of the CYBERWISER.EU “Effective training in cybersecurity in the new era of staff remotisation: Practical solutions, tools & opportunities” event, on 25th March 2021.SPARTAs’ Cybersecurity Training and Awareness working group, represented by Jan Hajny, will integrate the first events’ roundtable - Capacity building in cybersecurity: solutions - with ECSO and the other 3 Pilots of the future European Cybersecurity Competence Network.
For more information on the event...
More >>
SAFAIR AI Contest is launched!
4th Mar 2021
The evaluation of machine learning models robustness in adversarial settings is not a trivial task. If the model is robust to a particular kind of attack, it is not a sufficient measure of its robustness. In order to have confidence in the predictions made by the model, one needs to check its robustness against a variety of attack techniques.The SAFAIR AI Contest aims to evaluate the robustness of a defence technique by means of a two-player game. The participants can either register in the...
More >>
A Best-Practices Guide to Attract and Retain Women in Cybersecurity Teams
3rd Mar 2021
Cybersecurity needs to build a diverse workforce, able to respond to the challenges of a globalised and ever-changing world. Different ways of approaching problems, when coordinated, bring a competitive advantage to cybersecurity teams as they can strategically and satisfactorily meet such challenges. Today, women only account for 20% of the poorly diverse cybersecurity workforce worldwide. On top of that, Cybersecurity Ventures predicts that there will be 3.5 million unfilled jobs globally b...More >>