U bent hier

dcypher verenigt onderzoekers, docenten, producenten, gebruikers en beleidsmakers in Nederland om kennis en kunde over cyberveiligheid te verbeteren

Impressie Seaside Matchmaking Cybersecurity 2016


Part of ICT.OPEN 2017 conference, is the session ‘Peaks in Dutch Cyber Security Research’. The objective of this session is to demonstrate the progress and achievements in the execution of recent Dutch cybersecurity research.DCSRP AwardIn this session three recent cybersecurity research papers will be presented by their main authors (PhD students in most cases). An international Jury, with  Prof. Dr. Stefan Katzenbeisser (Germany), Dr. Lorenzo Cavallaro (UK) and Dr. Nele Mertens (Belgium), under technical chairmanship of Drs. Jan Piet Barthel (dcypher/NWO), selected these papers, out of twelve papers submitted.The research paper top 3, candidates for the DCSR best paper Award 2017, are (in alphabetical order):Flush, Gauss and Reload – a Cache Attack on the Bliss Lattice Based Signature SchemeLeon Groot Bruinderink et al. Complete addition formulas for prime order elliptic curvesJoost Renes et al. Drammer: Deterministic Rowhammer Attacks on Mobile PlatformsVictor van der Veen et al. All presenters receive a signed certificate. After the research paper presentations, out of these top three the best paper will be proclaimed by the Jury. The presenter of this paper will receive the Dutch Cyber Security Research best paper Award (DCSRP Award). This prestigious prize was introduced in 2015 to acknowledge the best recent non-commercial scientific cybersecurity research paper. The prize will be awarded  with -in addition- a € 500 IBM bonus cheque!BCMT AwardNew in the cybersecurity session this year is the Best Cybersecurity Master Thesis (BCMT) Award. A committee consisting of representatives of several Dutch Universities and companies lead by Dr. Nicola Zannone has selected two theses out of six theses submitted. These two highly ranked cyber security theses will be presented by the master students themselves. Both presenters will receive a signed certificate, only one of them the BCMT Award.The Master Thesis Award candidates (in alphabetical order) are:Achieving 128-bit Security against Quantum Attacks in OpenVPNSimon de Vries, UT Resilience of the Domain Name System: A case study for .nlLars Bade, RUN Register HERE for participation via the ICT.OPEN 2017 form !! Cybersecurity sessions concentrated on the first day of event, the 21st of March 2017ICT.OPEN is the principal ICT research conference in the Netherlands. It features two distinguished plenary key notes and invited speakers, as well as many oral and poster presentations. The state of art in ICT research is presented and discussed here. More information: www.ictopen.nl
A dedicated cybersecurity research session is again part of the ICT.OPEN 2017 conference program, scheduled in the afternoon of March 21st 2017. The objective of this session is to demonstrate the progress and achievements in the execution of recent cybersecurity research.Morning of the 21st of MarchNew at ICT.OPEN this year is that there are semi-plenary sessions scheduled in the morning. We are proud to announce that one of the main speakers is Prof.dr. Bart Jacobs. Professor Jacobs research concentrates on theoretical and practical aspects of security. On the theoretical side, his focus is on quantum logic and computation, supported by an ERC Advanced Grant. On the practical side, he is interested in identity and privacy management.At ICT.OPEN Bart Jacobs will address "ICT and Politics".More information about the morning program at www.ictopen.nl.  Afternoon Program: Peaks in Dutch Cyber Security Research14.30 – 14.35    Opening Session, Zeki Erkin, chair14.35 – 15.00    ICT.OPEN Call for Abstract-presentations  Cyber Security 3 presentations introduced by Joep van Wijk15.00 – 15.40    DCSRP Award 2017 presentations of 3 nominated papers selected by international scientific jury                            introduced by Jan Piet Barthel15.40 – 16.05    BCMT Award 2017 presentations of 2 nominated master theses introduced by Nicola Zannone16.05 – 16.10    Round-up, Zeki Erkin, chair– – break– –16.30 – 16.35    Introduction Keynote Speaker, Zeki Erkin, chair16.35 – 17.15    Privacy-preserving identity management and authentication: Blockchain and beyond                            Maria Dubovitskaya (IBM Research-Zurich)17.15 – 17.25    Announcement Cybersecurity nominee  Poster Award ICT.OPEN 201717.25 – 17.40    Hand-over DCSRP Award 2017 + IBM Bonus Cheque  201717.40 – 17.50    Hand-over BCMT Award 201717.50 – 17.55    Closing remarks, Zeki Erkin, chair Register HERE for participation via the ICT.OPEN 2017 form !! Cybersecurity sessions concentrated on the first day of event, the 21st of March 2017 ICT.OPEN is the principal ICT research conference in the Netherlands. It features two distinguished plenary key notes and invited speakers, as well as many oral and poster presentations. The state of art in ICT research is presented and discussed here. More information: www.ictopen.nl
Call for Presentations The international One Conference in The Hague, Netherlands, 16-17 May 2017The Dutch Government organizes the international One Conference 2017. This conference is invite-only and aims to facilitate the exchange of knowledge and ideas within the international cyber security community. To this aim 850 people from the (inter)national CERT community, academia, security professionals from public and private sector as well as our key partners from law enforcement and intelligence will participate in this event. The conference program offers topics of interest for a wide variety of participants, from (technical) specialists to decision-makers and researchers, from both the private and the public sector.Sessions The Dutch Government invites researchers, companies and professionals to submit proposals for presentations. All sessions are 40 minutes in length including Q&A. Previously published and/or presented material is welcome if the information and message are still new and relevant to this audience. Presentations will ultimately be chosen based on relevance to the topics below, maturity of results and relevance to the audience.TopicsTopics include but are not limited to:Technical: ICS/SCADA, botnets and malware, APTs, network detection, red teaming, internet routing and technologies, privacy, cryptography, medical devices, automotive, mobile devices, I-o-T, DDoS, (big) data analytics, machine learning, metricsIncident response: information sharing (detection), threat intelligence (sharing), CSIRT maturity, incident handling, cooperation (tactical and operational), incident analysis, coordinated vulnerability disclosure, case studies, lessons learnedGovernance: law enforcement, legal aspects, cross-border collaboration, risk management, public-private partnerships, organizational structures, coordinated vulnerability disclosure, data breaches, supply chain: responsibility & liabilityStrategic issues: cyber security & economic growth, implementing international cyber security strategy, (conflicts of) interest of values in cyber security, future scenarios, the government role regarding cyber security for I-o-T, cyber espionage & future economic impactHuman factor: offenders, victims, social engineering, insider threat, education and training, I-o-T and acting capacity of end users, privacyResearch & innovation: completed and ongoing cyber security research (fundamental and applied) and innovation Proposal requirementsProposals (maximum one page) should consist of:Title and abstractType of presentation (e.g. lecture, panel, demo and interactive aspects such as Q&A’s or real time polling)Aim of the presentation. What’s in it for the audience (public and private sector)?Target audience (e.g. technical specialists, analysts, policy makers)Short bio of the speaker All presentations are in English, commercial presentations are excluded. Proposals can be submitted to conference@ncsc.nl Important datesDeadline for submission: 31 January 2017Presenter notification: 15 March 2017Date conference: 16-17 May 2017 The One Conference 2017 is organized by the Ministry of Security and Justice and the Ministry of Economic Affairs


Smart homes, slimme apparaten, 'dode apps': Intel Security waarschuwt consumenten voor de beveiligingsrisico's van smartphones die constant verbonden zijn met internet en gekoppelde internet of things (Iot)-apparaten. Volgens de beveiliger weet zes op de tien Nederlanders niet zeker of zijn apparatuur besmet is met malware.In het McAfee Mobile Threath-rapport dat tijdens het Mobile World Congress (MWC) 2017 in Barcelona is gepresenteerd, wijst de beveiliger onder meer op vierduizend potentieel gevaarlijke apps die onlangs zijn verwijderd van Google Play. Volgens de rapporteurs zijn die ‘dode apps’ nog steeds geïnstalleerd op ruim 500.000 actieve toestellen.'De gemiddelde Nederlander besteedt nu 36 procent van zijn tijd thuis online. Maar hoewel we dus steeds meer een ‘connected lifestyle’ leven, heeft zes op de tien Nederlanders geen idee of weet niet helemaal zeker hoe ze kunnen controleren of hun internetapparaten zijn besmet met malware of dat een cybercrimineel toegang heeft gekregen tot hun apparaten', aldus de beveiligers in het rapport. Ook stelt het bedrijf dat fabrikanten hun verantwoordelijkheid moeten nemen en er voor moeten zorgen dat nieuwe producten standaard zijn voorzien van de juiste beveiligingsmaatregelen. Het kondigt een nieuwe samenwerking aan om netwerken beter te beveiligen. Het gaat om een samenwerking met de Britse maker van decoders en randapparatuur Humax. Dat bedrijf installeert standaard het McAfee Secure Platform op zijn Quantum T9 routers.McAfee keert terugIn september 2016 werd bekend dat chipgigant Intel een meerderheidsbelang van 51 procent van de Intel Security-tak verkocht aan investeringsmaatschappij TPG. In Intel's Securitytak zijn onder andere de oude activiteiten van McAfee ondergebracht. De overige 49 procent van de aandelen blijven in handen van Intel zelf. Naar verwachting wordt die overname in het tweede kwartaal van 2017 definitief afgerond. TPG meent dat McAfee als op zichzelf staand bedrijf beter in staat is om in te spelen op de snelle veranderingen in de securitymarkt. https://www.computable.nl/artikel/nieuws/security/5965589/250449/intel-waarschuwt-voor-risicos-internetapparaten.html
Het European Union Agency for Network and Information Security (ENISA) heeft de ‘Threat Landscape 2016’ gepubliceerd. Het rapport geeft een overzicht van de belangrijkste cyberdreigingen in 2016. Dit jaar wordt gekenmerkt door talrijke ernstige cyberincidenten, gericht op geld en politieke impact. Bedrijven en overheden nemen steeds zwaardere maatregelen, maar een artikel van MIT Technology Review betwijfelt of dit voldoende is. Cybercrime wordt namelijk steeds nadrukkelijker een manier van oorlogsvoering. Het artikel pleit voor een Tweede Geneefse Conferentie over dit onderwerp. Een artikel van Computer Weekly gaat over de toenemende cyberaanvallen op clouddiensten. Een tweede artikel van deze website geeft aan dat het hierbij steeds meer zal gaan om de manipulatie van data. Daarvoor waarschuwt Intel Security. Een derde artikel van Computer Weekly noemt drie strategieën tegen aanvallen op de integriteit van data. Ook een artikel van GovTech bespreekt de toenemende cyberaanvallen op clouddiensten. Een tweede artikel van GovTech stelt dat voor de verdere ontwikkeling van het Internet of Things nieuwe technologieën voor cybersecurity nodig zijn. Dit alles is doorgedrongen tot de politiek. Minister Bert Koenders (BuZa) gaf tijdens de Internationale Veiligheidsconferentie in München het startsein voor de Global Commission on the Stability of Cyberspace (GCSC). Deze groep van 24 prominente onafhankelijke experts vanuit overheden, bedrijfsleven en de it-wereld gaat voorstellen formuleren voor gedragsnormen in cyberspace.Nieuwsbericht ENISAENISA Threat Landscape Report 2016 (pdf)Artikel MIT Technology ReviewArtikel Computer Weekly – 1Artikel Computer Weekly – 2Artikel Computer Weekly – 3Artikel GovTech – 1Artikel GovTech – 2Nieuwsbericht Nederlandse overheid 
In een open brief aan de politiek pleit een groep van 20 wetenschappers voor de oprichting van een ministerie van Innovatie en Technologie. Het is geen nieuw pleidooi, maar de brede wetenschappelijke ondersteuning maakt de oproep wel krachtiger dan voorheen. De schrijvers menen dat politieke visie en daadkracht vooral nodig zijn om robotisering in goede banen te leiden en er tegelijkertijd optimaal van te profiteren. De eerste geluiden uit Den Haag over het idee zijn afwijzend. Een artikel van Nederland ICT vraagt zich af: “Dringt digitalisering wel door tot Den Haag?”Nieuwsbericht CursorOpen brief wetenschappers (pdf)Artikel Nederland ICT
Three Key Organisations Support the Ambition of a National Cyber Test Center. On 14 February 2017, during the presentation of the results of the investigation for a National Cyber Testbed,  it was announced that KPN, TNO and the Municipality of The Hague support the initiative for the development of a National Cyber Testbed. They underlined the importance of a testbed and will be the first to invest in developing concrete applications. The ambition is that more parties will join. The test center will provide answers to various aspects of cyber threats, with the focus on 'Smart Cities' and ‘The Internet of Things' (IoT).Digital security is a global issueThe world is becoming increasingly dependent on digital solutions and everyone and everything is connected through the Internet. This offers great opportunities for governments, businesses and households in everyday life. The digital infrastructures in cities become 'smart'. Examples are smart thermostats, locks and traffic lights that are remotely controlled as well as real-time sharing medical data. Unfortunately, this digitalisation makes our society vulnerable for cybercrime. Lately we have seen many examples in the world, e.g. the massive and widespread cyber attacks in the United States on 21 October 2016.A National Cyber TestbedIncreasing cyber threats lead to major societal challenges. In some countries, including Japan, the US and Singapore, national security test centers have already been set up. Partly for this reason, the Municipality of The Hague, with financial support from the Rotterdam The Hague Metropolitan Area (MRDH), asked the national security cluster The Hague Security Delta (HSD) and TNO to explore the necessity for a National Cyber Testbed. The three parties, KPNTNO and the Municipality of The Hague, together with The Hague Security Delta, endorse the importance of a National Cyber Testbed. Their expressed commitment is of great importance and in line with the National ‘Cyberplan’ Investment programme and the Narrative of HSD. This also consistent with the International Cyber Strategy that Minister Bert Koenders of Foreign Affairs sent to Dutch parliament on Monday 12 February.Presentation of OutcomesDeputy major of The Hague, Ingrid van Engelshoven, on behalf of the Rotterdam The Hague Metropolitan Area (MRDH), received the report with the outcomes of the investigation on why a National Cyber Testbed would be necessary, what it should look like and how it should be organised and financed. Ingrid van Engelshoven: "We must ensure the security of our digital traffic. For citizens, businesses and governments major stakes are involved. If businesses, governments and research institutions cooperate, we see opportunities to develop a National Cyber Test Centre. This is the first step in this collaboration."KPNKPN sees clear added value in the National Cyber ​​Testbed for increasing the digital security of the Internet of Things. " Joost Farwerck, Member of the Board of KPN, said: "Given the impact on society and especially on smart cities and smart homes, KPN supports the National Cyber ​​Testbed to test smart Internet Of Things (IoT) devices. We will link our national Lora Internet-of-Things network to the National Cyber ​​Testbed in order to test and unlock smart solutions for its users."TNOAnnemarie Zielstra "As the Netherlands, we must invest in our knowledge position and in standardisation. It is crucial to invest in knowledge on our own vulnerabilities, the threat landscape and on specific applications to protect ourselves. The National Cyber ​​Testbed will thus take care of an important link within the cybersecurity ecosystem. This will only be successful when government, industry and research institutions join hands."HSD"In our country alone, in the next few years billions of euros will be required for the national digital security," said Richard Franken, Executive Director of HSD. With the start of a National Cyber ​​Testbed for the 'Internet of Things', an important direction can be provided for this spending. Read more on our project pageFor the complete report click here
Hewlett Packard Enterprise en Red Hat gaan samenwerken op het gebied van network function virtualization (nfv). De samenwerking is in lijn met HPE’s multicloud en multi-stack strategie om klanten meer keuzemogelijkheden te bieden. Red Hat biedt via zijn Open Stack-platform een volledige open source basis voor nfv-implementaties.HPE gaat zijn NFV System-oplossingen en Validated Configurations voor nfv (network functions virtualization) aanbieden binnen het Red Hats Open Stack Platform en de Ceph Storage-omgeving.Op zijn beurt kan Red Hat gebruikmaken van de HPE OpenNFV Labs voor virtual network function-validatie. De integratie met Red Hat Open Stack Platform en Red Hat Ceph Storage wordt beschikbaar met de release van HPE NFV System 1.4.   https://www.computable.nl/artikel/nieuws/virtualisatie/5963412/250449/hpe-en-red-hat-sluiten-nfv-samenwerking.htm
Bekijk het volledige nieuwsoverzicht >