Energy infrastructures cooperation


In Phoenix project different actors, belonging to the Energy infrastructures business, work and cooperate for the harmonization of different sectors, for the optimization of the energy management strategy and for improving the resilience of the energy infrastructures.

Continue reading

Security hygiene in OT environment


Practicing good security hygiene provides networks and assets a fighting chance against hackers, and thus should be performed regularly, eventually becoming a routine, like brushing your teeth daily. The cheapest and most efficient way to start implementing security hygiene is to harden existing assets. A few guidelines of what steps should be performed are listed below.

Continue reading

The advantages of secure cyber threat sharing platform in PHOENIX platform

The secure and persistent communication (SPC) layer in the PHOENIX framework addresses the key challenges of threat sharing process as follows: establishing trusted relationships between participants through robust authentication and authorization methods, guaranteeing the reliability of data via integrity checks, fostering interoperability via unified semantics and message formats, preserving data privacy by persisting data hashes on the blockchain and automating all processes pertaining to data exchange.

Continue reading

The cyber risk exposure for the green energy sector

In the green energy sector, currently, almost everywhere, there has been a huge increase in energy demand, creating the current gas supply crisis, with the associated possible attacks by cyber criminals. This is why it becomes essential additional mechanisms and solutions for protecting the country’s economy.

Continue reading

Human factor in cybersecurity


These days, when more and more technologies are evolving in the direction of artificial intelligence to help digitalization and automations to evolve even faster, we often forget about the human factor in cybersecurity.

Continue reading

Benefits of Static and Dynamic Application Security Testing

Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) are methodologies used in application security testing to identify security vulnerabilities that can make an application susceptible to attack.

For making this effective, it must be an integral part of the software development CI/CD lifecycle from initial stages until final versions.

Continue reading


Latest PHOENIX Tweets

No posts Available for given user Or posts will be private.

This project has received funding from the European Union’s Horizon 2020 research and Innovation programme under grant agreement N°832989. All information on this website reflects only the authors' view. The Agency and the Commission are not responsible for any use that may be made of the information this website contains.

Sign up to our newsletter