![Vulnerability Assessment](/sites/fishy/files/public/styles/large/public/content-images/media/2021/blog3.png?itok=_jadAGtO)
Vulnerability Assessment ment
3rd FISHY blog entry by Nelly Leligou (SYNELIXIS) June 2021
![IoT supply chain](/sites/fishy/files/public/styles/large/public/content-images/media/2021/Blog2.png?itok=UmmwPcLJ)
Securing IoT nodes in supply of chains
2nd FISHY blog entry by Martí Miquel (UPC) May 2021
![newsletter_figure](/sites/fishy/files/public/styles/large/public/content-images/media/2021/supply_of_chain_0.png?itok=fZL39x_e)
FISHY: trustful and smart cybersecurity for supply chain
1st FISHY blog entry by José Francisco Ruiz (ATOS)
March 2021