Author Archives: admin

Critical Financial Infrastructure: Digital Transformation and the Cyber Imperative – Innovation and Standardisation

Financial Institutions are making increasing use of digital technologies, internet of things, AI, cloud technologies, application programming interfaces, and rapid software development all of which has heightened the cyber security risk as the threat landscape has evolved with increased complexity. Recent attacks on supply chains targeting multiple IT service providers through the exploitation of widely-used […]

The FINSEC Course on “Securing Critical Infrastructures in the Financial Sector”

The FINSEC Course on “Securing Critical Infrastructures in the Financial Sector” is now listed in the Security Courses Catalogue of the Concordia project. You can access: 1. the Concordia Catalogue here: and 2. the FINSEC Course here: (You must be registered in the platform). INNOV-ACTS has coordinated the development of the course, […]

IoT Tutorial: Wearables IoT Systems and Applications

Introducing Wearables  Wearables are small electronic devices, which comprise one or more sensors and are associated with clothing or worn accessories such as watches, wristbands, glasses and jewelry.  Wearables come also with some sort of computational capability, which enables them to capture and process data about the physical world. In several cases they provide the […]

Adaptive and Intelligent Data Collection

The security of critical financial infrastructure and services must be tracked and maintained through the collection and analysis of security-related data in an intelligent, resilient, efficient, secure and timely manner. Making security data collection and analysis intelligent and capable of quickly spotting, learning from, and addressing zero-day threats is essential to economizing of resources and […]

Detection of anomalies in critical financial infrastructure

Anomaly detection is a family of analytic techniques that learns typical properties of a system and reports significant deviations from the typical system’s properties as outliers. Anomaly detection is frequently used in state-of-the-art Intrusion Detection Systems (IDSs) because it can provide protection from new zero-day attacks whenever these attacks lead to deviations from typical behaviours […]