Blog Article #18 by DNSC


The validation of the requirements in the system design of the IRIS Project through the stakeholders and DNSC   DNSC contributed through its experts to a SAT management (Site Acceptance Test) and provided informal feedback for the IRIS pilots and requirements regarding the system design, the functional architecture, and the use cases, during the IRIS Validation [...]

Blog Article #18 by DNSC2023-11-01T08:23:40+00:00

Blog Article #17 by FVH


Enhancing Energy Infrastructure Security Through Cross-Border Collaboration: PUC3. Amidst the critical significance of cybersecurity within the energy domain, Pilot Use-case 3 (PUC3) in the IRIS project is dedicated to providing an infrastructure for testing and refining security measures in cross-border cities Tallinn and Helsinki. PUC3 aims to enhance the security of energy infrastructures by evaluating [...]

Blog Article #17 by FVH2023-10-10T11:11:26+00:00

Blog Article #16 by CEA


The BINSEC tool is designed to help finding potentially unknown vulnerabilities ("0day") in a system under test, assuming an access to some (security critical) executable code to be analyzed. Inside the static vulnerability detection module of IRIS Automated Threat Analytics (ATA), this is complementary to the capabilities offered by ATOS Vulnerability Discovery Manager (VDM), which [...]

Blog Article #16 by CEA2023-09-29T09:39:31+00:00

Blog Article #15 by ECSO


Community Building and linking with relevant stakeholders from industry With this blog post, we’d like to shed light on ECSO efforts linked to the Community Building Task. After initially creating a broad list of stakeholders, ECSO efforts were pointed towards engaging with industry representatives, more specifically Chief Information Security Officers (CISO). Established and coordinated by [...]

Blog Article #15 by ECSO2023-09-29T07:58:17+00:00

Blog Article #14 by KEMEA


CyberTraP module is a real-time capture the flag (CTF) scoring engine for training exercises that will be implemented in the IRIS Virtual Cyber Range. In the framework of IRIS project, this training environment will be utilized to host cyber-security activities where the trainees can practice their skills, regardless of experience, in both offensive and defensive [...]

Blog Article #14 by KEMEA2023-06-06T12:05:28+00:00

Blog Article #13 May 2023 by UPC


As explained by our partners in previous blog posts, the platform that is being developed at the IRIS project will be deployed and validated with the help of 3 Pilot Use Cases (PUC), located in 3 Smart Cities: Barcelona, Tallinn and Helsinki. Validation is a very necessary step to guarantee that the requirements and needs [...]

Blog Article #13 May 2023 by UPC2023-05-17T08:05:13+00:00

Blog Article #12 by TUD


Data Protection and Accountability module   The Data Protection and Accountability (DPA) module will be responsible for storing audit logs of activities performed on the Collaborative Threat Intelligence (CTI) database through the Advanced Threat Intelligence Orchestrator. The purpose and primary role of the DPA module within the IRIS architecture is to: Ensure accountability, auditing and [...]

Blog Article #12 by TUD2023-03-24T13:29:29+00:00

Blog Article #11 by ICCS


Advanced Threat Intelligence Orchestrator in IRIS project In the context of IRIS, Advanced Threat Intelligence Orchestrator will act as a medium for communication between external data sources and stakeholders. More specifically, it will manage, prioritize, and share cyber threat information in collaboration with the rest of the IRIs tools pipelined with an appropriate API-framework. This [...]

Blog Article #11 by ICCS2023-02-10T12:17:18+00:00

Blog Article #10 by CERTH


Cyber Threat Intelligence Storing and Sharing The IRIS project aims to assist European CERTs/CSIRTs minimise the impact of cybersecurity and privacy risks, as well as threats introduced by cyber-physical vulnerabilities in IoT platforms and by adversarial attacks on AI provisions and their learning/decision-making algorithms. To this end, IRIS aims to integrate and demonstrate a platform [...]

Blog Article #10 by CERTH2022-12-06T14:50:03+00:00

Blog Article #9 by SID


Digital Twin Honeypots as a defense measure for the Internet of Things   Digital Twin systems are primarily systems that communicate and share data to generate a holistic knowledge of the systems' operations and optimize decision making. Digital Twins are expected to transform the way industry runs, shifting from tight physical asset management to an [...]

Blog Article #9 by SID2022-10-14T06:55:44+00:00
Go to Top