Blog

Continue form PART VIII   SPHINX shall allow third-parties to discover and retrieve the available SPHINX functionalities. The SPHINX Platform shall enable third-parties to discover and access the different SPHINX data protection and information cyber security services that are available to them. A discovery system should provide the...

[vc_row disable_margin_on_row="no"][vc_column][vc_column_text]Continue form PART VII SPHINX shall provide configurable dashboard views per user. The SPHINX Platform shall enable users to establish the parameters of their own dashboard views, based on their role and duties concerning the operation of the IT ecosystem. Overall, this capability supports the...

Continue form PART VI SPHINX emulated services and systems shall operate in an isolated and safe environment. Τhe SPHINX Platform shall enable the emulated IT ecosystem services and systems to be isolated from the real IT environment, protecting the latter from being affected by malicious  actions or...

On Thursday, 3 June, 20201, SPHINX together 4 more Horizon 2020 projects funded under the same topic that was invited to the 19th meeting of the eHealth Network, a voluntary group consisting of the European Commission and the national eHealth authorities designated by the Member States. Namely, the...

On 24,25 and 27 of May 2021, SPHINX Consortium Members gathered virtually to hold a series of training sessions tailored to the needs of pilot implementing partners. These sessions served as the cornerstone of training activities task entailed in SPHINX project’s lifecycle, which ensures an...

On Wednesday, 26 May 2021, SPHINX Consortium Members, EDGE and Hospital do Espírito Santo in Évora, took part in the 9th Value APAH Conference organised by the Portuguese Association of Hospital Administrators (APAH) to disseminate the project's solution to the Healthcare Cybersecurity domain. The event was...

Continue from PART V SPHINX shall deliver enhanced anonymisation and encryption capabilities. The SPHINX Platform shall provide advanced anonymisation and encryption capabilities, namely through the use of anonymisation techniques and homomorphic encryption, to be applied to personal and sensitive data in full compliance with the General...

Continue from PART IV   SPHINX shall enable the categorisation of cyber events and potential cyber-attacks. The SPHINX Platform shall have the capability to categorise cyber events and potential cyber-attacks, based on the significance of those potential cyber incidents, following specific user behaviour (determined by the user’s...

Continue from PART III SPHINX shall detect anomalous behaviour in the organisation’s IT ecosystem, based on its discovered behavioural patterns. The SPHINX Platform shall discover patterns in the data produced by the healthcare organisation’s IT ecosystem and capture its normal behaviour (e.g., wait time, number of queries,...

Continue from PART II SPHINX shall provide vulnerability assessment checklists to users The SPHINX Platform shall provide vulnerability assessment checklists for the users, allowing them to employ effective tools for evaluating the state of readiness and the potential exposures and vulnerabilities of the IT ecosystem. It shall...