Blog

The main goal of any risk assessment model is to provide a relative or absolute quantification of risks in a comprehensible structure. Risk assessment and risk analysis explore the different possibilities and all the different factors that can affect them to quantify how likely each...

The Blockchain-based Threat Registry (BBTR) component acts a background infrastructure which safely stores different logs from different sources such as hospitals, care centres, pharmacies, medical devices and patients. It can be used to store any kind of interesting information, such as critical logs or thread...

A Security Information and Event Management (SIEM) system is a management security approach that provides a comprehensive view of an organization’s security information system. Furthermore, these systems are an important component of company networks, IT infrastructures and the cybersecurity domain. In fact, they allow to...

The SPHINX Data Inspection Component, also known as the Sandbox (SB), enables a solution for creating a safe and isolated environment for security testing and continuous component validation. Using existing technologies such as containerization and virtualization, this component aspires to provide the important infrastructure and...

Cybersecurity certification is a complex process that usually includes security auditing relevant to multiple compliance policies and security tests. Since the SPHINX project is focused on healthcare, it is important to highlight and address compliance policies and conduct audits relevant to healthcare data and the...

The 15th International Industrial Cybersecurity Experiences Congress was held between September 29 and October 1 in virtual format. The Industrial Cybersecurity Center (CCI) was the organiser of the event which featured participants of the highest level related to the world of industrial cybersecurity. The speakers shared their experience in critical infrastructure, cybersecurity requirements in an...

Homomorphisms are maps between algebraic structures that allow the development of cryptographic techniques that, in turn, permit computations to be performed on encrypted data. This as a result helps maintain data confidentiality while it is being processed, thus enabling tasks to be performed when data...