News

Honeypots are computer security components used to deflect cyber-attacks and deter certain types of attacks. They try to perfectly emulate information system resources with data that seem legitimate in order to lure the attackers in them and protect the real systems of a network from...

SPHINX Consortium member DYPE5, the fifth Greek Regional Health Authority, hosted a workshop that was dedicated to IT personnel of Healthcare organisations in order to raise their awareness regarding contemporary cybersecurity matters. The workshop took place virtually in Wednesday, 16 December 2020 and partners from National Technical...

On Thursday, 10 December, the EU funded observatory of research and innovation in the field of cybersecurity and privacy, Cyberwatching.eu hosted the webinar Security and Privacy by Design for Healthcare. The context of the event was based on the present global situation that the Covid19 pandemic has brought to the...

Date: 10 December 2020 Location: Online On Thursday, 10 December 2020,  Cyberwatching.eu, the EU funded observatory of research and innovation in the field of cybersecurity and privacy hosted the webinar Security and Privacy by Design for Healthcare Current levels of privacy protection and security are highly dependent on the intrinsic risk...

Register here Date: 16 December 2020, 14:30 - 17:10 CET Location: Online SPHINX project puts stress on the cyber awareness of staff as an essential element of contemporary cybersecurity practices on Healthcare organisations. To this end, Consortium Member, DYPE5, is hosting an online workshop titled "CYBERAWARE4HEALTH: Cybersecurity Awareness in...

SPHINX’s support to incident forensics is materialised in the Forensic Data Collection Engine (FDCE) component which correlates, analyses and stores in a privacy-respectful manner all incident-related information and data from different levels and contexts of the system. The FDCE is able to discover the relationships between...

The main goal of any risk assessment model is to provide a relative or absolute quantification of risks in a comprehensible structure. Risk assessment and risk analysis explore the different possibilities and all the different factors that can affect them to quantify how likely each...

The Blockchain-based Threat Registry (BBTR) component acts a background infrastructure which safely stores different logs from different sources such as hospitals, care centres, pharmacies, medical devices and patients. It can be used to store any kind of interesting information, such as critical logs or thread...

A Security Information and Event Management (SIEM) system is a management security approach that provides a comprehensive view of an organization’s security information system. Furthermore, these systems are an important component of company networks, IT infrastructures and the cybersecurity domain. In fact, they allow to...

The SPHINX Data Inspection Component, also known as the Sandbox (SB), enables a solution for creating a safe and isolated environment for security testing and continuous component validation. Using existing technologies such as containerization and virtualization, this component aspires to provide the important infrastructure and...