CyFORT

CyFORT logo

CyFORT: Cloud Cybersecurity Fortress of Open Resources and Tools for Resilience

Abstractions Lab, in collaboration with itrust consulting, develop the CyFORT project in the context of the EC-approved IPCEI-CIS under the 8ra umbrella initiative.

IDPS-ESCAPE (𝜶 release)

Intrusion Detection and Prevention Systems – Enhanced Security through a Cooperative Anomaly Prediction Engine

An open-source SOAR system powered by a Risk-aware Anomaly Detection-based Automated Response (RADAR) subsystem and a deep learning-based AD subsystem (SONAR), integrated with Wazuh, Flowintel, Suricata.

IDPS-ESCAPE logo

SATRAP-DL (𝜶 release)

Semi-Automated Threat Reconnaissance and Analysis Powered by DECIPHER Logic

A suite of tools for computer-aided CTI analysis and incident handling, provided by its sub-systems SATRAP and DECIPHER. PyFlowintel, a Python library for interacting with Flowintel, has also been developed within SATRAP-DL.

C5-DEC (Stable release)

Common Criteria for Cybersecurity, Cryptography, Clouds – Design, Evaluation and Certification

A suite of methods and CAD tools dealing with the creation and evaluation of secure IT systems according to the CC standards, capturing SSDLC, V&V, and our cyber-physical system security assessment method

C5-DEC logo

CS-GRAM

Cloud Services: Governance, Risk management, Audit, Monitoring

Key tools include OpenTRICK, a full-featured risk management tool, assisting in assessing risk, planning actions, as required by an ISO/IE 27001 compliant information security management system (ISMS)

OpenTRICK logo

PQC-MAT

Post-Quantum Cryptography Migration Assistance Theory and Tools

A suite of tools bundled under VECTOR (VErified Cryptography & Transition via Observable Registry) ranging from cryptography-oriented threat modelling and risk assessment, to verified implementations and asset inventorization

Logo-PQC-MAT

DLT-PSaaS

Distributed Ledger Technology – Pseudonymization as a Service

CyFORT themes​

Post-Quantum Cryptography, Formal Methods, Quantum Computing, automated reasoning, cyber threat intelligence, intrusion detection and prevention, Artificial Intelligence, Threat Modelling and Risk Assessment, Common Criteria, Secure Software Engineering, Verifiable Software, provable Information Security, Secure Software Development Life Cycle, Security Monitoring and Incident Handling

Interested in a collaboration? Contact us!

Scroll to Top