Governance activities form the backbone of the network, supporting community activities that range from roadmap design to Request for Challenges, from monthly SPARTA Workshops to bi-yearly SPARTA Days. Research programs are continuously spun from strands of the roadmap, led by experts of their fields, and aim at generating concrete and transformative results.
News & Events
SPARTA Data Sharing Infrastructure
24th Jun 2021Data sharing is one of the key aspects of building a comprehensive cybersecurity concept within the T-SHARK programme. Shared cyber incident-related data, extracted using different technological tools; structured contextual information from different sources makes it possible to connect separate events, better understand targets and build situation awareness in the whole ecosystem.
The specially developed SPARTA Data Sharing infrastructure consists of the integration of two main existing sharing platforms: the “MISP Threat Sharing’’ systems and the “C3ISP Collaborative and Confidential Information Sharing and Analysis for Cyber Protection’’ system. The main frontend of the SPARTA Data Sharing Infrastructure will be represented by the MISP data-sharing platform because the MISP graphical user interface offers a wide number of functionalities to help users in their searches and analysis and, at the same time, it is very easy and intuitive to be used. Secondly, the data format used t...
ROUNDATABLE: “From education, going through the R&D&i, towards the Intelligent Company”
17th Jun 2021Last week the “VI National Cybersecurity Research Days” conference (https://2021.jnic.es/programa) was held in Spain, in which Ana Ayerbe from TECNALIA presented SPARTA in a roundtable organised by the Spanish Chapter of the Women4Cyber initiative.
The roundtable covered the different issues related to the cybersecurity supply chain, starting with the education needs to cover the talent gap, going through the different efforts in the Research and Development area, to finalise with the technological transfer of technologies and solutions towards the companies, and the creation of Cybersecurity startups.
The roundtable started with a presentation by Mar Lopez from the National Cybersecurity Department (DSN) that talked about the status of Cybersecurity at Spanish level, the talent needs and the gender and diversity dimension introducing the Women4Cyber initiative.
After that, two entrepreneurs talked about their experience in the Cybersecurity world: Azucena Hernández, CEO of EUROC...
Universidad de Las Palmas de Gran Canaria & SPARTA Cybersecurity Curricula Designer
7th Jun 2021Today we are happy to share with you that, within the context of the Go Cyber with SPARTA campaign, promoted by WP12 – Dissemination and Communication – and leveraged by WP9 – Cybersecurity Training and Awareness, SPARTA has delivered a workshop on how to successfully design and implement a bachelor study program on cybersecurity to the University of Las Palmas de Gran Canaria (ULPGC).
The first session of the workshop started off with a brief presentation of the SPARTA project, the *Go Cyber with SPARTA** campaign and the far-reaching work of the WP9, that already counts with the deployment of a Cybersecurity Skills Framework, a user- friendly Cybersecurity Education Map and an intuitive Cybersecurity Curricula Designer, a tool that connects education providers with cybersecurity job market.
The second session, led by Edmundas Piesarskas, was dedicated to explaining the challenges that the EU is facing in the cybersecurity domain and how a Cybersecurity Skills Framework is part o...
pz → Python instead of Bash
7th May 2021author: Edvard Rejthar
translation: Petra Raszková
I would like to present you the pz utility as pythonize, intended for a command line user with knowledge of Python. Current Linux distributions have many efficient tools for input processing at their disposal. But have you ever wished that you could use Python syntax instead?
Do you often browse through the manual, and trying to find out how do those switches for formatting behave? Do you find the Bash source code difficult to read? Then, this article is meant for you.
You will learn how to write a simple program and how the program is evaluated, which variables are available. You will find out a few words about auto-import, switches and also some examples of use.
The command line is an outstanding user interface which is characterized by stunning global (if not) enthusiasm, then range. It is possible to connect to the terminal almost on the last washing machine. Some users are afraid of using of the command line, however so...
A First Look at Android Applications in Google Play related to Covid-19
29th Apr 2021The APKcovid work aims at evaluating the security and efficiency of covid tracing applications, to ensure that these applications limit themselves to the purpose of contact tracing and do not intrude into user privacy by accessing unnecessary information available in the smartphone.
Paper available at: https://arxiv.org/abs/2006.11002
To appear in Springer Empirical Software Engineering, 2021
VACSINE - Security remediation at the Edge
25th Apr 2021Vacsine provides a lightweight security orchestration, automation and response tool to deploy on the fly security policies to respond to changing operating conditions and active threats.
APProver tool: providing a security evaluation of apps
22nd Apr 2021The APProver tool aims at providing a security evaluation of apps embedded in smartphones, to verify compliance with security policies and do not include malware.
SPARTA CAPE tool: detecting and mitigating side-channel vulnerabilities
18th Apr 2021This SPARTA tool, developed within CAPE program, aims at detecting and mitigating side-channel vulnerabilities, attacks that have significantly risen with the publication of SPECTRE or MELTDOWN, and are particularly difficult to handle.
Evaluating the security of the open-source software supply chain
12th Apr 2021This flyer presents a series of tools aiming at evaluating the security of the open-source software supply chain. More specifically, we provide tools to evaluate the consequences of vulnerabilities in open source libraries on the applications that use them