News

The Blockchain-based Threat Registry (BBTR) component acts a background infrastructure which safely stores different logs from different sources such as hospitals, care centres, pharmacies, medical devices and patients. It can be used to store any kind of interesting information, such as critical logs or thread...

A Security Information and Event Management (SIEM) system is a management security approach that provides a comprehensive view of an organization’s security information system. Furthermore, these systems are an important component of company networks, IT infrastructures and the cybersecurity domain. In fact, they allow to...

The SPHINX Data Inspection Component, also known as the Sandbox (SB), enables a solution for creating a safe and isolated environment for security testing and continuous component validation. Using existing technologies such as containerization and virtualization, this component aspires to provide the important infrastructure and...

Cybersecurity certification is a complex process that usually includes security auditing relevant to multiple compliance policies and security tests. Since the SPHINX project is focused on healthcare, it is important to highlight and address compliance policies and conduct audits relevant to healthcare data and the...

The 15th International Industrial Cybersecurity Experiences Congress was held between September 29 and October 1 in virtual format. The Industrial Cybersecurity Center (CCI) was the organiser of the event which featured participants of the highest level related to the world of industrial cybersecurity. The speakers shared their experience in critical infrastructure, cybersecurity requirements in an...

Experience in the use of Blockchain and its applicability to the industrial sector Official Website 29-30 September & 1 October, 2020 The International Industrial Cybersecurity Experiences Congress is an event organized by the Industrial Cybersecurity Center (CCI). The 15th edition of the congress was held virtually on September 29-30 and October 1...

Homomorphisms are maps between algebraic structures that allow the development of cryptographic techniques that, in turn, permit computations to be performed on encrypted data. This as a result helps maintain data confidentiality while it is being processed, thus enabling tasks to be performed when data...