Category: Blog
-
Designing Intuitive and Secure User Interfaces in Cyber Resilience Frameworks
Posted on
by
Introduction In cybersecurity and cyber resilience, the effectiveness of a system is often as good as its user interface (UI). As AEGIS leads the charge in developing the UI for PHOENi2X project, we focus on creating user interfaces that are functionally robust
-
EU’s proposal for an AI Act – the world’s first initiative on regulating Artificial Intelligence
Posted on
by
Against the backdrop of EU’s soft-law initiatives providing guidance “on fostering and securing ethical and robust AI”, such as the European Commission’s HLEG’s “Ethics Guidelines for Trustworthy AI”,[1] in April 2021 the European Union commenced its formal deliberations on the world’s first
-
Increased OES preparedness, through PHOENI2X Cyber Range -enabled realistic scenario assessment & training
Posted on
by
Fysarakis Konstantinos, PhD; Chief Technology Officer; Sphynx Analytics Ltd, Cyprus As ENISA’s recent Threat Landscape reports highlight, sophisticated and targeted attacks in critical domains (e.g., energy, healthcare) are on the rise, with hybrid threats, i.e., threats combing both the cyber and the
-
Safeguarding the Critical Information Infrastructures though Phoeni2x framework
Posted on
by
In today’s interconnected digital landscape, critical information infrastructures (CIIs) form the backbone of modern societies encompassing sectors like energy, finance, healthcare, transportation, and more. These infrastructures provide essentials services to the society and the continuity of their services is vital. However, the
-
The Rise of Supply Chain Attacks
Posted on
by
What is a supply chain attack A supply chain attack refers to a cyber attack that aims at infiltrating and compromising the software or hardware supply chain of an organization. Instead of directly targeting the organisation’s systems, the attacker focuses on compromising
-
Use of Transfer-Learning to improve the detection of zero-day attacks
Posted on
by
Protection of critical infrastructures (CIs) has become a priority in the last years. CIs have adopted new technologies which have increased their efficiency, but that, unfortunately have made them to be more vulnerable to cyberattacks, specially when considering the Industrial Internet of
-
Regulatory compliance supported by PHOENI2X
Posted on
by
Cybersecurity has a prominent place in recent EU legal activities. A plethora of regulations and directives that provide governance tools to bolster cybersecurity have been released. This regulatory work comprises a framework that affects and guides authorities, operators of essential services, incident
-
The Influence of Artificial Intelligence on Social Engineering Attacks – The Attackers’ Perspective
Posted on
by
Social engineering is a cyberattack trying to manipulate people into divulging sensitive information or performing actions that compromise their security. It can take many forms, from phishing scams to impersonation and baiting. Some current trends include: A first tool which comes to
-
Reducing the risk of cyber-attacks by incorporating cyber security features in IoT solutions
Posted on
by
Over the last ten years, IoT (Internet of Things) has started taking center stage as one of the big technological advancements. IoT devices and solutions provide convenience, interconnectivity, safety and the ability to monitor remotely activities that in the past was almost
-
How can AI be used to enhance Cyber Security of Essential Services?
Posted on
by
As the world becomes increasingly digital, the need for robust cybersecurity measures becomes more and more important. This is especially true for Operators of Essential Services (OES), such as means of public transportation, power plants, and telecommunications, who are responsible for ensuring










