Category: Blog
-
Assessing PHOENI2X’s Impactful Contribution to Cybersecurity Through Targeted Surveys
Posted on
by
In the ever-evolving landscape of cybersecurity, the PHOENI2X project stands as a beacon of innovation and resilience. Funded under the European Union’s Horizon Europe programme, PHOENI2X aims to bolster the cyber resilience of Operators of Essential Services (OES) across sectors such as […]
-
Mapping the Incident Responder: A Technical Perspective on Global Framework Diversity and the PHOENI2X Initiative
Posted on
by
In the realm of cybersecurity, Incident Responders serve as critical operators, safeguarding organizations against digital threats. While their core responsibilities—such as threat detection, incident triage, containment, remediation, and post-incident analysis—are universally acknowledged, the specific definitions and expectations of this role vary significantly […]
-
Building a Cyber Resilience Culture within Organizations
Posted on
by
Cyber threats continue to evolve, making it critical for organizations to cultivate a strong cyber resilience culture. The PHOENI2X project emphasizes the need for a proactive approach to cybersecurity, focusing not only on advanced technologies but also on fostering a resilient mindset […]
-
Leveraging CACAO Playbooks for Next-Generation Cyber Threat Intelligence and Response
Posted on
by
Introduction In the evolving landscape of cybersecurity, threats are becoming more sophisticated, and their impact is ever more disruptive. As organizations strive to remain resilient, the ability to systematically coordinate and automate responses to these threats is becoming a crucial part of […]
-
Anomaly detection in railway infrastructures
Posted on
by
Raúl Rabadán, Ester Simó, Eva Rodríguez Universitat Politècnica de Catalunya (UPC) Sensor based IoT devices are being increasingly integrated into critical infrastructures to enable continuous monitoring, enhancing operational performance and safety. Decisions related to operations, maintenance, and safety are made based on […]
-
The Role of Digital Forensics in Cyber Resilience: Insights from PHOENI2X
Posted on
by
Introduction Cybersecurity threats are becoming increasingly sophisticated, making it crucial for organizations to have robust mechanisms in place to detect, analyze, and mitigate incidents effectively. As part of the PHOENI2X project, digital forensics plays a pivotal role in helping organizations investigate cyber […]
-
Building Intelligent SOCs for NIS2 Incident Reporting Requirements: A Strategy for Success
Posted on
by
The PHOENI2X initiative is driving innovation in cybersecurity across critical sectors such as healthcare, energy, and transport. A key challenge is aligning with the NIS2 Directive, which introduces stringent requirements to bolster cybersecurity across the European Union. Among its core demands are […]
-
Backdoors and Breaches: How Supply Chain Attacks Threaten Healthcare and How to Fight Back
Posted on
by
The healthcare sector’s dependence on interconnected systems and third-party services has made it an attractive target for sophisticated supply chain attacks. In this blog post, we explore a potential real-world example of a malicious actor compromising a source code repository, injecting a […]
-
Overview of Social Engineering Attacks on PHOENI2X Use Cases and Novel Mitigations
Posted on
by
Kristian Beckers, PhD; CEO; Social Engineering Academy GmbH, Germany Alejando Quintanar; CTO; Social Engineering Academy GmbH, Germany Social engineering is the acquisition of confidential, private or privileged information by methods including both technical and non-technical means e.g. such as shoulder surfing, dumpster […]
-
Achieving Cyber Resilience through standards-based, machine-processable & executable Incident Response & Business Continuity Playbooks
Posted on
by
Fysarakis Konstantinos, PhD; Chief Technology Officer; Sphynx Analytics Ltd, Cyprus Introduction Cybersecurity incidents are growing in frequency, complexity & impact, in tandem with the increasing pervasiveness of digital technologies, applications, and services in our societies and economies. There has been a surge […]