Blog TID may2022

A reference framework for FISHY

In the FISHY Project, we have several components and tools that needs to be integrated and have connectivity among them.
Polito blog

Easing the burden of network configuration: a capability-driven approach

Looking back to just ten years ago, the complexity and flexibility of software networks have taken an impressive leap forward. These advancements had a massive impact on the network administration procedures and, of course, their management costs. However, we do not witness the same level of enthusiasm when looking at the influence on security practices.
Blog December1

The importance of early detection of vulnerabilities and attacks for a healthy supply chain

When addressing the resilience of supply chains in their complexity, a platform that provides vulnerability forecast, risk estimation and mitigation must consider the heterogeneous nature of supply chain infrastructures . Authors: Joao Costa, Jan Antič, Aleš Černivec, Lucija Korbar (XLAB)
Car CAPGEMINI

FISHY, IoT Security for the automotive Supply Chain

5th Blog entry by Guillermo Jiménez Prieto (CAPGEMINI) October 2021
Blog sonae

The importance of security in the Industry 4.0 paradigm

4th Blog entry by Ana Machado Silva (Sonae) and José Duarte (Sonae Arauco) October 2021
Vulnerability Assessment

Vulnerability Assessment ment

3rd FISHY blog entry by Nelly Leligou (SYNELIXIS) June 2021
IoT supply chain

Securing IoT nodes in supply of chains

2nd FISHY blog entry by Martí Miquel (UPC) May 2021
newsletter_figure

FISHY: trustful and smart cybersecurity for supply chain

1st FISHY blog entry by José Francisco Ruiz (ATOS) March 2021