Blog Article #12 by TUD
Data Protection and Accountability module The Data Protection and [...]
Blog Article #11 by ICCS
Advanced Threat Intelligence Orchestrator in IRIS project In the context [...]
Blog Article #10 by CERTH
Cyber Threat Intelligence Storing and Sharing The IRIS project aims [...]
Blog Article #9 by SID
Digital Twin Honeypots as a defense measure for the Internet [...]
Blog Article #8 by CEL
Facing ethics and security issues What is the ethics [...]
Blog Article #7 by CLS
Autonomous Risk-based Response & Self-Recovery Uptake of IoT and [...]
Blog Article #6 by CISCO
As our collegues from ATOS explained in the Blog Article [...]
Blog Article #5 by ATOS
Released initial version of IRIS platform and reference architecture The [...]
Blog Article #4 by INTRA
A DevSecOps approach for releasing a security-hardened IRIS integrated platform [...]
Blog Article #3 by DNSC
The project system co-design – a challenge for DNSC team [...]