Home » Marketplace » Maintenance

Maintenance

Runtime security monitoring

Verify any security violation at runtime, monitoring stack for the run-time conditions so that the self- learning and self-healing mechanisms can be fed.  

PIACERE Framework

Keywords: cybersecurity, static analysis, model checking, Wazuh, vulnerability assessment 

Benefits: 

  • Able to run integrated vulnerability scanners to scan web applications and detect web vulnerabilities  

Component Security Inspector

Analysing also the IaC code, reports the potential vulnerabilities and proposes potential fixes, addressing the dependency information from the IaC and application code, detect included programs and libraries with known vulnerabilities by querying public vulnerability databases, and produce a report to the PIACERE user.  

PIACERE Framework

Keywords: IaC, component, scanner, vulnerability, reports 

IaC Code Security Inspector

Avoid misconfigurations, insecure coding and configuration patterns through an automated solution for checking the integrity and applicability of IaC code that is to be deployed on an infrastructure. 

PIACERE Framework

Keywords: IaC, code quality, infrastructure, misconfigurations 

Benefits: 

  • Identifies possible vulnerabilities and improvements 

FISHY Secure Infrastructure Abstraction

 

Abstract interface allowing the orchestration and connectivity of virtualized functions for monitoring and mitigation actions on different types of underlying infrastructure (IoT, IaaS, baremetal, etc) 

FISHY Enforcement & Dynamic Configuration

Framework leveraging a capability model instead of the traditional refinement techniques based on logic rules

FISHY Intent-based Resilience Orchestration

Solution translating high level intents into configured policies, and interact with the system response using AI techniques

FISHY Trust & Incident Manager

When addressing the resilience of supply chains in their complexity, a platform that provides vulnerability forecast, risk estimation and mitigation must consider the heterogeneous nature of supply chain infrastructures as an important driver of architectural design and exposing it with an architecture designed for supply chains, instead of single network.

FISHY CYBER RESILIENT SUPPLY CHAIN SYSTEM

Easing FISHY platform usability, making the whole system user-friendly and ready to be used for different users according to their expected profile and thus permitted functionalities.

Toolikit for Anonymous Authentication for Hyperledger Fabric

This toolkit allows users to anonymously authenticate their Hyperledger Fabric transactions while supporting revocation and audit functionalities.

This toolkit was produced by IBM Research and is available here.

IoTsTrust

In this wild IoT market, estimating cybersecurity risks, selecting the right standard to comply with and getting certified during the manufacturing process is an extremely complex task. Security Requirements, Security Controls and Security Assurance Activities must be considered by all the project stakeholders including business-lines and risk-owners.

Pages

News

In the last few years, cyber security has become more of a priority for all types of organisations than ever before.

Future Events

As part of its mission to share information on European cybersecurity calls, provide financing opportunities, and encourage networking and the formation of consortia among the European cybersecurity community, the European Cybersecurity Competence Centre’s (ECCC) ”Info Days” series begins with a webinar on 1 June 2023 from 14:00 to 17:00 CET. The webinar will cover three of the most important open cybersecurity calls of the Digital Europe Programme (DEP), including pitches on potential solutions from the audience.

01/06/2023

The European Cybersecurity Competence Centre (ECCC), with the support of ECCO, launches “The Info Days”, a series of events to share information on important European calls and funding opportunities. The second event, organised in cooperation with the Swedish National Coordination Centre, will be held on 16 June 14:00 – 16:00 in Stockholm, as a side event of the Digital Assembly(15 – 16 June).

16/06/2023