Blog Cybersecurity Certification, Standardization and the Importance of Data Exchange in EPES Author: - IKE - In CyberSEAS, we will investigate the cybersecurity readiness of involved infrastructures to…CyberSEAS publisherFebruary 29, 2024
Blog Recommendations of Cybersecurity in the Energy Domain Author: - Eva Čaleta - ICS - The analysis of electric power systems' (EPES) cybersecurity…CyberSEAS publisherJanuary 16, 2024
Blog Securing the Energy Supply Chain: Cybersecurity Design Principles for EPES Author: - Prof. Luigi Romano - CINI - Prosumers, with their capability to impact the…CyberSEAS publisherJanuary 10, 2024
Blog Mitigation measures Author: - INFORMATIKA - The implementation of suitable mitigation measures against cyber threats and attacks…CyberSEAS publisherDecember 11, 2023
Blog Rules and tools for the coordination with CERTs Author: - INFORMATIKA - Efficient incident response is fundamental in cybersecurity as it limits the…CyberSEAS publisherDecember 11, 2023
Blog Cybersecurity of Energy Common Data Spaces Author: - ENERIM - In the CyberSEAS project, Enerim focuses on cybersecurity of energy common…CyberSEAS publisherNovember 22, 2023
Blog Best practices of Cybersecurity in the Energy Domain Author: - ICS - A comprehensive analysis of cyber security of electric power systems (EPES)…CyberSEAS publisherNovember 21, 2023
Blog CVIAT: CVSS 4.0 – enabled interactive dashboard for the analysis of vulnerable assets Author: - Synelixis SA- In the context of the CyberSEAS project, Synelixis SA has developed…CyberSEAS publisherNovember 2, 2023
Blog RATING: Risk Assessment Tool for INtegrated Governance Author: - Marco Angelini, Engineering Spa- RATING is a Risk Assessment Tool for INtegrated Governance,…CyberSEAS publisherNovember 2, 2023
Blog Guardtime’s MIDA tool protects cross-border CIM file exchange against potential cyber attacks Author: - Liis Livin and Priit Anton, Guardtime- Cross-border energy trade is crucial for providing…CyberSEAS publisherOctober 26, 2023