Tag: Cybersecurity
-
CYRENE
Categories: RnD-ProjectsDespite the socio-economic importance of tools and techniques for handling security threats there is still no easy, structured, standardized and trusted way to forecast, prevent and manage interrelated and propagated cybersecurity vulnerabilities and threats in a way that takes into account the heterogeneity and complexity of today’s supply chains. Read more
-
HEIR
Categories: RnD-ProjectsThe vision of HEIR is to provide a thorough threat identification and cybersecurity knowledge base system addressing both local (in the hospital / medical centre) and global (including different stakeholders) levels, that comprises real time threat hunting services, facilitated by advanced machine learning technologies. Read more
-
ENSURESEC
Categories: RnD-ProjectsENSURESEC aims to minimize the impact of security incidents on interconnected services and ensure that all involved actors are kept informed. The project combines an automatic, rigorous, distributed and open-source toolkit for protecting e-commerce by monitoring the impact of threats in physical spaces and launching a campaign for training SMEs and citizens to create awareness and trust. Read more
-
ROXANNE
Categories: RnD-ProjectsROXANNE is a multidisciplinary project that brings together 24 European partners comprising technology providers and the strongest organizations in the field of crime investigation and monitoring, known as Law Enforcement Agencies. Read more
-
C4IIoT
Categories: RnD-ProjectsThe C4IIoT project aims to design, build and demonstrate a novel and unified Cybersecurity 4.0 framework that implements an innovative Internet-of-Things (IoT) architecture paradigm to provide an end-to-end holistic and disruptive security-enabling solution for minimising the attack surfaces in Industrial IoT systems. Read more
-
THREAT-ARREST
Categories: RnD-ProjectsTHREAT-ARREST fills in the gap for an advanced security training framework implemented within any organization type, helping them to cope with the ever-expanding landscape of cyber-attacks and protect effectively and efficiently their ICT cyber-systems. Read more