Skip to main content
Tag

IoT security

Innovation in Action: Strategies for Exploiting Horizon Europe Results News

Innovation in Action: Strategies for Exploiting Horizon Europe Results

Join us for the online workshop "Innovation in Action: Strategies for Exploiting Horizon Europe Results" on June 23, 2025, 10:00-13:00 CEST!   We’re excited to invite you to a collaborative workshop organized by four Horizon Europe research projects — TELEMETRY, DOSS, COBALT, and EMERALD — all focused-on driving innovation from…
Conceptual overview of the DOSS Digital Cybersecurity Twin Framework, part 1. Insights

Conceptual overview of the DOSS Digital Cybersecurity Twin Framework, part 1.

Within the DOSS IoT Supply Trust Chain (STC) Concept, we apply a digital twin framework, called the Digital Cybersecurity Twin (DCT). The DCT enables us to perform the automated vulnerability scanning and penetration testing of an IoT system in a virtualized environment, on a digital twin. This way, we can…
The program of the LIFESEC2025 Workshop has been published! News

The program of the LIFESEC2025 Workshop has been published!

The Workshop on Whole-Lifecycle Security for Smart Systems: Methods and Tools (LIFESEC2025) will take place on 16. June 2025, in Cork, Ireland, co-located with the 11th International Conference on Smart Computing (SMARTCOMP2025). Organized by the Horizon Europe projects DOSS and TELEMETRY, the workshop will dive into cutting-edge methodologies for ensuring secure…
Professor Erol Gelenbe was Invited Panelist at the INFOCOM2025 News

Professor Erol Gelenbe was Invited Panelist at the INFOCOM2025

We are proud to share that on 20 May, 2025, Professor Erol Gelenbe served as an Invited Panelist on the topic "Towards 6G" at the prestigious INFOCOM 2025 Conference, one of the world’s leading forums in computer and telecommunications research. Professor Gelenbe addressed key cybersecurity challenges, including risks in supply…
UK “Call for Views on the Cyber Security of Enterprise Connected Devices” News

UK “Call for Views on the Cyber Security of Enterprise Connected Devices”

The UK government is evaluating legislation to enhance cybersecurity for enterprise IoT devices, as it did for consumer devices via its Product Security and Telecommunications Infrastructure (PSTI) Act. This move follows concerns over the vulnerability of industrial and business-critical IoT systems, which are increasingly targeted in cyberattacks. The UK government  announced…
Digital Transformation of Security Standards: Requirements Extraction using LLMs Insights

Digital Transformation of Security Standards: Requirements Extraction using LLMs

By Miltiadis Siavvas,  Information Technologies Institute (ITI) of the Centre for Research and Technology-Hellas (CERTH) In this insight post, we present the approach CERTH proposes for enabling the automation of the identification and extraction of security requirements from security standards with Large Language Models (LLMs). Compliance with international security standards…
ECSO Webinar: „Actions Beyond Words: Automating Audits for Streamlined Cybersecurity Compliance in Europe” News

ECSO Webinar: „Actions Beyond Words: Automating Audits for Streamlined Cybersecurity Compliance in Europe”

ECSO organized a webinar with NIST, on how OSCAL can be applied to an information system for documenting and assessing its security controls and transition from a text-based and manual approach (using word processors or spreadsheets) to a set of standardised, machine-readable formats. Our colleagues Prof. Antonio Skarmeta and Sara…