All news

All news

News

News

News

News

SnT Partnership Day

itrust demonstrated the Localisation Assurance Service Provider (LASP) at the SnT Partnership Day.

FP7 CockpitCI Kick-off and website

itrust participated to the FP7 project CockpitCI which aims to improve the resilience and dependability of Critical Infrastructures (CIs) by the automatic detection of cyber-threats and the sharing of real-time information about attacks among CI owners. This three year project started in January 2012 and launched its website today.

Links: cockpitci.itrust.lu/

FP7 i-GOing Kick-off and website

itrust consulting participated to the FP7 project i-GOing funded by the European Comission. The project aims at developing a prototype for indoor navigation based on the pseudolites technology. itrust, being responsible for the dissemination of the project, announces the opening of the official project website.

Links: igoing.itrust.lu

ENC-GNSS 2012

itrust consulting is glad to announce that the abstract submitted to the European Navigation Conference(www.enc2012.org) has been accepted for an oral presentation. In the context of an ESA funded project, itrust presented an algorithm to detect GNSS attacks by analysing clock information.

Merry Christmas and a Happy New Year!

itrust consulting wishes you a Merry Christmas and a Happy New Year

ILNAS meetings for PSDC

itrust consulting participates in a series of meetings at ILNAS to prepare an accreditation referential for dematerialisation and preservation service providers (PSDC).

The EU has regulated the security requirements for online collection systems of citizens’ initiatives.

The EU has regulated the security requirements for online collection systems of citizens’ initiatives. The EU relies on standards like ISO 27001, 27002 and 27005, which are part of itrust’s training, consulting and audit services.

Links: Regulations on http://europa.eu

Publication of an exploit on metasploit framework

itrust consulting publishes an exploit for the application snortreport. This exploit allows arbitrary code execution.

Links: Exploit on http://metasploit.com

hack.lu 2011

Workshop on metasploit and two conférences.

Archive