The Trust Monitor tool allows to manage at a higher level the remote attestation process introducing flexibility and independence from the attestation framework used.
Farm to Fork VAT demo: This is a demonstration of the capabilities and usage of the VAT component of the FISHY platform in the F2F use case.
Farm to Fork Unauthorized User attack: This is a demonstration of the "Unauthorized User" attack scenario, for the F2F use case, and how the FISHY platform helps mitigate it.
Farm to Fork Unauthorized device Wallet ID Warehouse attack: This is a demonstration of the "Unauthorized Device - Wallet ID level" attack scenario, for the F2F use case, and how the FISHY pl
Farm to Fork Attack to blockchain node: This is a demonstration of the "Attack to a Blockchain node" attack scenario, for the F2F use case, and how the FISHY platform helps mitigate it.
Key Innovations in Supply Chain Cybersecurity and Resillience that Make Sense in Today's Industry
We have made avaialble the pitch deck for each of the 7 Key Exploitable Results in this presentation.
This our 2nd FISHY roll-up prepared for our General Assembly in Maia (Portugal) next week.
Here you have our joint infographic with H2020 CYRENE(https://www.cyrene.eu/). Both projects aim to offer a solution for the cybersecurity of interconnected supply chains.
Wood-Based Panels Trusted Value-Chain use case by Sonae Arauco