Home » Marketplace » Information Protection Processes and Procedures

Information Protection Processes and Procedures

FISHY Secure Infrastructure Abstraction

 

Abstract interface allowing the orchestration and connectivity of virtualized functions for monitoring and mitigation actions on different types of underlying infrastructure (IoT, IaaS, baremetal, etc) 

FISHY Security & Privacy Dataspace Infrastructure

An enhanced framework for system events' management, including metrics from different sources and promoting co-relation with added semantics​

FISHY Security Assurance & Certification Manager

Component architecture tailored to supply chains needs focussing especially on regulatory obligations (e.g., GDPR) and violations/compliance of service level agreements

FISHY CYBER RESILIENT SUPPLY CHAIN SYSTEM

Easing FISHY platform usability, making the whole system user-friendly and ready to be used for different users according to their expected profile and thus permitted functionalities.

Cyber Security Program for Startups

Worldwide Startups can secure their business with Cyber Legion helps.

Every Startup Organization, regardless of its size, collects, stores, and uses important information, and can struggle to implement powerful cybersecurity practices because of limited resources such as time, money, and people.

Cyber Legion team believe that any Organizations should be help to build and maintain trust and lasting relationships with clients and beneficiaries.

Toolkit for Privacy-Preserving Data Storage on Ledgers

This toolkit is meant for data storage is a ledger-oriented solution for bridging data re-siding on a blockchain with those stored in an off-chain database. It is responsible for coordinating interaction between the backend ledger, storage, and the cryptographic library of an API service.

This toolkit was produced by National Infrastructures for Research and Technology for Greece and is available here.

Toolkit for Zero-knowledge Proofs for Ledgers

This toolkit, with the nickname SNARKY, is a Rust implementation of the Snarky Ceremonies protocol over the BLS12- 381 elliptic curve. It is the first experimental version of a production-grade library for running the protocol in real-life applications. 

This toolkit was produced by National Infrastructures for Research and Technology for Greece and The University of Edinburgh and is available here.

Toolkit for Secure Multi-Party Computation on Ledgers

This toolkit allows  libraries for two/multi-party computation to use a ledger as a communication channel instead of point-to-point connections. The toolkit consists of two parts: 1) the first module generically allows libraries from two/multi-party computation to use a ledger as a communication channel instead of point-to-point connections; 2) the second module is an upgrade of MPyC to add the possibility of verifying computations.

Toolkit for Mir-BFT: High-throughput Consensus for Hyperledger Fabric

This toolkit introduces an efficient consensus algorithm to Hyperledger Fabric to accommodate high-throughput applications.

This toolkit was produced by IBM and is available here.

Toolkit for Post-Quantum Secure Protocols

This enables authentication and integrity protection based on hash functions which are believed to be resilient against quantum attacks. Hash function based time-stamping can also indemnify transactions authenticated with current technology against future quantum attacks.

This toolkit was produced by Guardtime and is partially available here.

Pages

News

In the last few years, cyber security has become more of a priority for all types of organisations than ever before.