Skip to content
cyrene
  • About
    • Concept
    • Work Plan
    • Impact
  • The pilots
    • CYRENE Pilot 01 – The Port trial case execution
    • CYRENE Pilot 02 – The Automotive Manufacturer trial case execution
  • The partners
  • Resources
    • Deliverables
    • Publications
    • Glossary
    • Material
  • News & Events
    • News
    • Events
    • Blog
    • Newsletter
  • CYRENE Open Call
    • CYRENE Open Call Webinar
  • Contact
  • Toggle website search
Menu Close
  • About
    • Concept
    • Work Plan
    • Impact
  • The pilots
    • CYRENE Pilot 01 – The Port trial case execution
    • CYRENE Pilot 02 – The Automotive Manufacturer trial case execution
  • The partners
  • Resources
    • Deliverables
    • Publications
    • Glossary
    • Material
  • News & Events
    • News
    • Events
    • Blog
    • Newsletter
  • CYRENE Open Call
    • CYRENE Open Call Webinar
  • Contact
  • Toggle website search
Read more about the article Ransomware in a supply chain environment.

Ransomware in a supply chain environment.

  • Post author:SpirosFotis
  • Post published:18 January 2022
  • Post category:Blog

In today’s world, the internet supply chain owners and participants need to make sure that not only their companies are secure from cyber-attacks, but the rest of the affiliates of the supply chain are secured as well. This need becomes more prominent with the rise in popularity of ransomware attacks...

Continue ReadingRansomware in a supply chain environment.
Read more about the article FPGA technology and Supply Chain Cyber Security

FPGA technology and Supply Chain Cyber Security

  • Post author:SpirosFotis
  • Post published:18 January 2022
  • Post category:Blog

Hardware-based security, using Field-Programmable Gate Array (FGPA) technology, may provide a viable solution for securing critical parts of Supply Chain systems against cyberattacks.

Continue ReadingFPGA technology and Supply Chain Cyber Security
Read more about the article Attack graphs in cyber security

Attack graphs in cyber security

  • Post author:DoraDora
  • Post published:19 September 2021
  • Post category:Blog

The frequency of cyber attacks and the possible damages they can cause, demand systematic and reliable approaches to address security issues.

Continue ReadingAttack graphs in cyber security
Read more about the article Maximizing CYRENE’s benefit for the EU community​

Maximizing CYRENE’s benefit for the EU community​

  • Post author:DoraDora
  • Post published:12 April 2021
  • Post category:Blog

CYRENE is a HORIZON 2020 funded project and as such is financed by EU citizens. Therefore, it aims to benefit to the largest number of citizens possible and the fruits of our research to reach society as a whole.

Continue ReadingMaximizing CYRENE’s benefit for the EU community​
  • Go to the previous page
  • 1
  • 2
  • 3

Privacy policy Terms & Conditions Cookie policy

Copyright 2020 - Cyrene Project

You can find out more about which cookies we are using or switch them off in .

cyrene
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

3rd Party Cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!

Cookie Policy

More information about our Cookie Policy