Blog Mitigation measures Author: - INFORMATIKA - The implementation of suitable mitigation measures against cyber threats and attacks…CyberSEAS publisherDecember 11, 2023
Blog Rules and tools for the coordination with CERTs Author: - INFORMATIKA - Efficient incident response is fundamental in cybersecurity as it limits the…CyberSEAS publisherDecember 11, 2023
Events Presentation of CyberSEAS project at the National Consultation of the State Council Author: ICS - On November 27, 2023, the State Council of the Republic of Slovenia…CyberSEAS publisherDecember 6, 2023
Blog Cybersecurity of Energy Common Data Spaces Author: - ENERIM - In the CyberSEAS project, Enerim focuses on cybersecurity of energy common…CyberSEAS publisherNovember 22, 2023
Events Enlit Europe 28-30 November 2023 Author: Romanian Energy Center - Enlit hits the road to find out how the energy…CyberSEAS publisherNovember 22, 2023
Blog Best practices of Cybersecurity in the Energy Domain Author: - ICS - A comprehensive analysis of cyber security of electric power systems (EPES)…CyberSEAS publisherNovember 21, 2023
Events CyberSEAS – Sardinia Plenary meeting Author: Romanian Energy Center - The last week of September (25-28 Sept), in Sardinia, Olbia,…CyberSEAS publisherNovember 16, 2023
Blog CVIAT: CVSS 4.0 – enabled interactive dashboard for the analysis of vulnerable assets Author: - Synelixis SA- In the context of the CyberSEAS project, Synelixis SA has developed…CyberSEAS publisherNovember 2, 2023
Blog RATING: Risk Assessment Tool for INtegrated Governance Author: - Marco Angelini, Engineering Spa- RATING is a Risk Assessment Tool for INtegrated Governance,…CyberSEAS publisherNovember 2, 2023
Blog Guardtime’s MIDA tool protects cross-border CIM file exchange against potential cyber attacks Author: - Liis Livin and Priit Anton, Guardtime- Cross-border energy trade is crucial for providing…CyberSEAS publisherOctober 26, 2023