Shopping cart

    Subtotal

    View cartCheckout

    Category: News

    Synthetic Data in Cybersecurity Research: SAFE4SOC’s Practical Approach

    Synthetic Data in Cybersecurity Research: SAFE4SOC’s Practical Approach SAFE4SOC’s WP5 meetings in March 2025 addressed the use of synthetic IDMEFv2 datasets for AI training and validation. This approach was

    Read More

    Linking AI Outputs to Standards: SAFE4SOC’s Integration Logic

    Linking AI Outputs to Standards: SAFE4SOC’s Integration Logic WP5 and WP3 discussions in early 2025 explored how AI outputs could meaningfully inform standardisation. By expressing AI detections as IDMEFv2

    Read More

    From Prototype to Pilot: Preparing SAFE4SOC for Operational Validation

    From Prototype to Pilot: Preparing SAFE4SOC for Operational Validation WP8 meetings in early 2025 highlighted that moving toward pilots requires more than technical readiness. Operational workflows, legal constraints, and

    Read More

    Resetting Momentum: SAFE4SOC’s Second-Phase Kick-Off

    Resetting Momentum: SAFE4SOC’s Second-Phase Kick-Off The SAFE4SOC kick-off meeting in February 2025 marked a clear transition into a second, more execution-focused phase. Partners openly acknowledged delays, staffing changes, and

    Read More

    Preparing SOC Pilots: Constraints, Agreements, and Expectations in SAFE4SOC

    Preparing SOC Pilots: Constraints, Agreements, and Expectations in SAFE4SOC WP8 discussions in early 2025 focused on preparing pilot SOCs for validation activities. This process involved more than technical readiness.

    Read More

    Policy Enforcement at SOC Boundaries: SAFE4SOC Gateway Design

    Policy Enforcement at SOC Boundaries: SAFE4SOC Gateway Design Technical discussions in June 2024 examined how gateways could enforce sharing rules without overcomplicating workflows. SAFE4SOC gateways were designed to apply

    Read More

    From Requirements to Architecture: Translating SOC Needs into SAFE4SOC Design

    From Requirements to Architecture: Translating SOC Needs into SAFE4SOC Design SAFE4SOC’s architecture did not emerge in isolation. It is the result of iterative discussions linking operational needs, regulatory constraints,

    Read More

    Why Information-Sharing Gateways Matter in SOC Collaboration

    Why Information-Sharing Gateways Matter in SOC Collaboration During technical discussions in June 2024, SAFE4SOC partners repeatedly returned to the role of gateways in enabling secure and policy-compliant information sharing

    Read More

    Centralised Operations as a Validation Strategy in SAFE4SOC

    Centralised Operations as a Validation Strategy in SAFE4SOC Discussions during the June 2024 consortium meetings clarified how SAFE4SOC would operationalise its validation strategy. Faced with diverse SOC environments and

    Read More

    Why SAFE4SOC Chose a Centralised Use Case for SOC Information Sharing

    “Why SAFE4SOC Chose a Centralised Use Case for SOC Information Sharing During the first year of SAFE4SOC, one of the most consequential design discussions concerned the choice between distributed

    Read More