The Knowledge Base Repository (KBR) is an important part of SPHINX Toolkit. Its purpose is...
Honeypots are computer security components used to deflect cyber-attacks and deter certain...
SPHINX Consortium member DYPE5, the fifth Greek Regional Health Authority, hosted a worksh...
On Thursday, 10 December, the EU funded observatory of research and innovation in the fi...
SPHINX’s support to incident forensics is materialised in the Forensic Data Collection E...
The main goal of any risk assessment model is to provide a relative or absolute quantifica...
The Blockchain-based Threat Registry (BBTR) component acts a background infrastructure whi...
A Security Information and Event Management (SIEM) system is a management security approac...
The SPHINX Data Inspection Component, also known as the Sandbox (SB), enables a solution f...
Cybersecurity certification is a complex process that usually includes security auditing r...
Continue from PART II In order to indicate the most suitable and efficient approach for th...
Continue from PART I In order to indicate the most suitable and efficient approach for the...
The 15th International Industrial Cybersecurity Experiences Congress was held between ...
Machine Learning based Intrusion Detection (MLID) is part of the Automated Cyber Security ...
Homomorphisms are maps between algebraic structures that allow the development of cryptogr...
SPHINX Architecture consists of five building blocks featuring components that work both i...
Continue from Part I The Automated Cyber Security Risk Assessment is one of the building b...
The Automated Cyber Security Risk Assessment is one of the building blocks of SPHINX Archi...
Risk management is a central concern for every organisation. Risk can take different forms...
Within a large and complex network environment, such as healthcare infrastructures, hundre...
In 2001, Mirca R. Endsley defined Situation Awareness (SA) as the key to providing informa...
Continue from Part II In SPHINX building blocks, the technical consortium members are join...
Continue from Part I In SPHINX building blocks, the technical consortium members are joini...
Continue from blog entry SPHINX Use Cases: Part VII Through the following classification ...
The SPHINX solution is featuring a modular architecture, which comprises 5 building blocks...
On June 24 and 25, 2020, SPHINX took part in a joint event along with ten more H2020 proj...
Continue from blog entry SPHINX Use Cases: Part VI Through the following classification o...
SPHINX project labels the cybersecurity threats that a healthcare organisation may face as...
HealthIT Conference is an annual congress dedicated to the state of the art on the sector ...
Continue from blog entry SPHINX Use Cases: Part V Through the following classification of...
Continue from blog entry SPHINX Use Cases: Part IV Through the following classification of...
In cybersecurity context, an attack vector can be defined as a path or a means, through wh...
Much like many other critical infrastructures, Healthcare Sector comprises several human a...
Information Security Risk Management orchestrates all the necessary activities to ensure t...
Supported by European Union’s Horizon 2020 Research and Innovation Programme SPHINX is t...
Continue from blog entry SPHINX Use Cases: Part III Through the following classification o...
Continue from blog entry SPHINX Use Cases: Part II Through the following classification o...
Continue from blog entry SPHINX Use Cases: Part I Through the following classification of ...
SPHINX project adopts five application scenarios embracing today’s growing digitisation ...
SPHINX consortium recently published the final version of the system’s high-level design...
SPHINX project adopts five application scenarios embracing today’s growing digitisation ...
On February 2020, SPHINX Partners from National Technological University of Athens (NTUA),...
Healthcare, like many other industries, is becoming more efficient in delivering clinical ...
Cybersecurity has erupted as a prominent issue for industry sectors, including Healthcare ...
SPHINX Consortium Partner, EDGE, participated at the Security Mission Information & In...
SPHINX aims to produce a cyber-security toolkit for universal application on Heath Deliver...
During 2019 SPHINX kick-started its lifecycle and Consortium Members joint their efforts t...
On November 11th the Global Blockchain Congress, Gonvergence 2019, was held at Málaga, S...
CUREX project took part in the 18th Web Intelligence conference (WI’19), where it held i...
Hospitals and healthcare organisations have started to evolve from a place of care to a de...
While “fake news” as a term has only recently entered the public consciousness and bro...
This Blog is published at the Tech Inspire website, click here for reading ...
SAFECARE’s first Awareness Event was held in Leuven and Vicky Moumtzi of the Vilabs ...
On 28 and 29 of May 2019, PANACEA organized the 1st End users/stakeholders Workshop in ...
SPHINX (A Universal Cyber Security Toolkit for Health-Care Industry), an Horizon2020 Resea...
Date: 2 April Location: Colegio de Médicos de Bizkaia, Lersundi Kalea, 9, 48009 Bilbo, ...