The European Cluster for Securing Critical Infrastructures (ECSCI) held its second worksho...
Following the final stages of SPHINX Toolkit testing in the pilot sites, the project organ...
In the aftermath of the ransomware attack on the Irish national health service, SPHINX s...
A hands-on session was organised as a training session, in which the pilot end-users actua...
On Saturday, 27 November 2021, Stylianos Karagiannis (PDMFC) and Sotiris Pelekis (NTUA) re...
The SPHINX System interacts with the user in order to develop cyber awareness concerning r...
On Wednesday, 6 October 2021, project partner from Hospital do Espirito Santo in Evora, P...
On October 8, 2021, the ECSCI cluster co-organised a virtual workshop in the context of ES...
The SPHINX System interacts with the user in order to develop cyber awareness concerning r...
The SPHINX System interacts with the user in order to develop cyber awareness concerning r...
The SPHINX System interacts with the user in order to develop cyber awareness concerning r...
The SPHINX System interacts with the user in order to develop cyber awareness concerning r...
The SPHINX System interacts with the user in order to develop cyber awareness concerning r...
On Monday, 26 July, SPHINX partners, Konnektable Technologies Ltd. (KT) and PDMFC, took pa...
The SPHINX System interacts with the user in order to develop cyber awareness concerning r...
Continue form PART VIII SPHINX shall allow third-parties to discover and retrieve t...
Continue form PART VI SPHINX emulated services and systems shall operate in an isolated an...
On Thursday, 3 June, 20201, SPHINX together 4 more Horizon 2020 projects funded under the...
On 24,25 and 27 of May 2021, SPHINX Consortium Members gathered virtually to hold a series...
On Wednesday, 26 May 2021, SPHINX Consortium Members, EDGE and Hospital do Espírito Santo...
Continue from PART V SPHINX shall deliver enhanced anonymisation and encryption capabiliti...
Continue from PART IV SPHINX shall enable the categorisation of cyber events and po...
Continue from PART III SPHINX shall detect anomalous behaviour in the organisation’s IT ...
Continue from PART II SPHINX shall provide vulnerability assessment checklists to users Th...
Continue from PART I. SPHINX shall protect against known cyber-attacks. The SPHINX Platfor...
SPHINX pilot implementing partners have worked jointly with technical partners that are le...
On Thursday, April 15, 2021, at 14:00 CEST, the Horizon 2020 project CUREX, hosted the on...
The Cyberwatching.eu platform is a Horizon 2020 Coordination and Support Action for Unit ...
In order to produce user behaviour information from captured traffic, it is important to a...
Being few months into its final implementation year, SPHINX partners are working on the in...
One of the core functionalities of the ABS component of SPHINX Toolkit is to produce a sim...
Several SPHINX use-cases involve remote patient monitoring, aiming to prevent and detect s...
The SPHINX cybersecurity toolkit is a wide constellation of digital interconnected or stan...
The Security Incident/Attack Simulator constitutes one part of the Attack and Behaviours S...
The SPHINX system generates alerts and notifications based on a large amount of data, whic...
Logging mechanisms on web applications daily collect a huge amount of data that, when used...
Date: Monday, February 1st, 2021 Location: Online Zoom Call ViLabs organized and coordinat...
The term ‘Decision Support System’ refers to an interactive computer-based system or s...
The SPHINX Service Manager (SM) component keeps the registry of services managing informat...
The Knowledge Base Repository (KBR) is an important part of SPHINX Toolkit. Its purpose is...
Honeypots are computer security components used to deflect cyber-attacks and deter certain...
SPHINX Consortium member DYPE5, the fifth Greek Regional Health Authority, hosted a worksh...
On Thursday, 10 December, the EU funded observatory of research and innovation in the fi...
SPHINX’s support to incident forensics is materialised in the Forensic Data Collection E...
The main goal of any risk assessment model is to provide a relative or absolute quantifica...
The Blockchain-based Threat Registry (BBTR) component acts a background infrastructure whi...
A Security Information and Event Management (SIEM) system is a management security approac...
The SPHINX Data Inspection Component, also known as the Sandbox (SB), enables a solution f...
Cybersecurity certification is a complex process that usually includes security auditing r...
Continue from PART II In order to indicate the most suitable and efficient approach for th...
Continue from PART I In order to indicate the most suitable and efficient approach for the...
The 15th International Industrial Cybersecurity Experiences Congress was held between ...
Machine Learning based Intrusion Detection (MLID) is part of the Automated Cyber Security ...
Homomorphisms are maps between algebraic structures that allow the development of cryptogr...
SPHINX Architecture consists of five building blocks featuring components that work both i...
Continue from Part I The Automated Cyber Security Risk Assessment is one of the building b...
The Automated Cyber Security Risk Assessment is one of the building blocks of SPHINX Archi...
Risk management is a central concern for every organisation. Risk can take different forms...
Within a large and complex network environment, such as healthcare infrastructures, hundre...
In 2001, Mirca R. Endsley defined Situation Awareness (SA) as the key to providing informa...
Continue from Part II In SPHINX building blocks, the technical consortium members are join...
Continue from Part I In SPHINX building blocks, the technical consortium members are joini...
Continue from blog entry SPHINX Use Cases: Part VII Through the following classification ...
The SPHINX solution is featuring a modular architecture, which comprises 5 building blocks...
On June 24 and 25, 2020, SPHINX took part in a joint event along with ten more H2020 proj...
Continue from blog entry SPHINX Use Cases: Part VI Through the following classification o...
SPHINX project labels the cybersecurity threats that a healthcare organisation may face as...
HealthIT Conference is an annual congress dedicated to the state of the art on the sector ...
Continue from blog entry SPHINX Use Cases: Part V Through the following classification of...
Continue from blog entry SPHINX Use Cases: Part IV Through the following classification of...
In cybersecurity context, an attack vector can be defined as a path or a means, through wh...
Much like many other critical infrastructures, Healthcare Sector comprises several human a...
Information Security Risk Management orchestrates all the necessary activities to ensure t...
Supported by European Union’s Horizon 2020 Research and Innovation Programme SPHINX is t...
Continue from blog entry SPHINX Use Cases: Part III Through the following classification o...
Continue from blog entry SPHINX Use Cases: Part II Through the following classification o...
Continue from blog entry SPHINX Use Cases: Part I Through the following classification of ...
SPHINX project adopts five application scenarios embracing today’s growing digitisation ...
SPHINX consortium recently published the final version of the system’s high-level design...
SPHINX project adopts five application scenarios embracing today’s growing digitisation ...
On February 2020, SPHINX Partners from National Technological University of Athens (NTUA),...
Healthcare, like many other industries, is becoming more efficient in delivering clinical ...
Cybersecurity has erupted as a prominent issue for industry sectors, including Healthcare ...
SPHINX Consortium Partner, EDGE, participated at the Security Mission Information & In...
SPHINX aims to produce a cyber-security toolkit for universal application on Heath Deliver...
During 2019 SPHINX kick-started its lifecycle and Consortium Members joint their efforts t...
On November 11th the Global Blockchain Congress, Gonvergence 2019, was held at Málaga, S...
CUREX project took part in the 18th Web Intelligence conference (WI’19), where it held i...
Hospitals and healthcare organisations have started to evolve from a place of care to a de...
While “fake news” as a term has only recently entered the public consciousness and bro...
This Blog is published at the Tech Inspire website, click here for reading ...
SAFECARE’s first Awareness Event was held in Leuven and Vicky Moumtzi of the Vilabs ...
On 28 and 29 of May 2019, PANACEA organized the 1st End users/stakeholders Workshop in ...
SPHINX (A Universal Cyber Security Toolkit for Health-Care Industry), an Horizon2020 Resea...
Date: 2 April Location: Colegio de Médicos de Bizkaia, Lersundi Kalea, 9, 48009 Bilbo, ...