Blog

Cybersecurity certification is a complex process that usually includes security auditing relevant to multiple compliance policies and security tests. Since the SPHINX project is focused on healthcare, it is important to highlight and address compliance policies and conduct audits relevant to healthcare data and the...

The 15th International Industrial Cybersecurity Experiences Congress was held between September 29 and October 1 in virtual format. The Industrial Cybersecurity Center (CCI) was the organiser of the event which featured participants of the highest level related to the world of industrial cybersecurity. The speakers shared their experience in critical infrastructure, cybersecurity requirements in an...

Homomorphisms are maps between algebraic structures that allow the development of cryptographic techniques that, in turn, permit computations to be performed on encrypted data. This as a result helps maintain data confidentiality while it is being processed, thus enabling tasks to be performed when data...

SPHINX Architecture consists of five building blocks featuring components that work both independently and in collaborative ways. The Third-party APIs block enables third-party healthcare solution providers to access and interact with the SPHINX toolkit. In this context, the SPHINX Application Programming Interface for Third Parties (S-API)...

Risk management is a central concern for every organisation. Risk can take different forms and originate from either inside or outside the organisation. IT security is amongst one of the concerns that drive strategy at every corporation, including the risk of non-compliance, data breaches, infrastructure outages,...