{"id":4482,"date":"2025-09-22T08:42:10","date_gmt":"2025-09-22T06:42:10","guid":{"rendered":"https:\/\/cybernemo.eu\/?p=4482"},"modified":"2025-09-22T08:42:11","modified_gmt":"2025-09-22T06:42:11","slug":"cybersecurity-in-the-computing-continuum-the-cybernemo-challenge","status":"publish","type":"post","link":"https:\/\/cybernemo.eu\/index.php\/2025\/09\/22\/cybersecurity-in-the-computing-continuum-the-cybernemo-challenge\/","title":{"rendered":"Cybersecurity in the Computing Continuum \u2013 The CyberNEMO Challenge"},"content":{"rendered":"\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In today\u2019s hyperconnected world, the\u00a0<strong>Computing Continuum (CC)<\/strong>\u2014spanning IoT devices, edge computing, and cloud infrastructure\u2014presents both unprecedented opportunities and complex cybersecurity challenges. The\u00a0<strong>CyberNEMO project<\/strong>, funded by the European Union\u2019s Horizon Europe programme, is tackling this head-on with an end-to-end cybersecurity approach that integrates risk analysis, ethics and regulatory governance and compliance.<\/p>\n\n\n\n<p>The recently published deliverable\u00a0<strong>D1.1<\/strong>\u00a0outlines the threat and ethics assessment conducted across four critical sectors:<\/p>\n\n\n\n<ul class=\"ul-custom\">\n \t<li>\n<p lang=\"en-GB\">Smart energy and water infrastructures<\/p>\n<\/li>\n \t<li>\n<p lang=\"en-GB\">Secure media content supply chains<\/p>\n<\/li>\n \t<li>\n<p lang=\"en-GB\">Healthcare systems<\/p>\n<\/li>\n<li>\n<p lang=\"en-GB\">Smart farming and logistics<\/p>\n<\/li>\n<\/ul>\n\n\n\n<p>Each of the four trials serves as a\u00a0<strong>living lab<\/strong>\u00a0to validate CyberNEMO\u2019s technologies:<\/p>\n\n\n\n<ul class=\"ul-custom\">\n \t<li>\n<p lang=\"en-GB\">Smart meters and EV charging stations are protected against ransomware and data breaches using Zero Trust Network Architecture (ZTNA) and AI-based anomaly detection.<\/p>\n<\/li>\n \t<li>\n<p lang=\"en-GB\">Media content is securely produced and distributed using microservices, encryption, and federated learning.<\/p>\n<\/li>\n \t<li>\n<p lang=\"en-GB\">Hospitals defend against insider threats and phishing attacks while ensuring personal and confidential data sharing in compliance with GDPR and other relevant regulations.<\/p>\n<\/li>\n<li>\n<p lang=\"en-GB\">Smart farming systems use drones, IoT sensors, and blockchain to ensure traceability and cybersecurity in the olive oil supply chain<\/p>\n<\/li>\n<\/ul>\n\n\n\n<p>These trials demonstrate the&nbsp;<strong>scalability and adaptability<\/strong>&nbsp;of CyberNEMO across diverse sectors and regulatory environments<\/p>\n\n\n\n<p>Using the\u00a0<strong>MITRE ATT&amp;CK framework<\/strong>, the project identified\u00a0<strong>44 unique threat types<\/strong>\u00a0and over\u00a0<strong>100 functional and non-functional requirements<\/strong>, as well as 23 ethics and regulatory concerns and corresponding requirements. These threats and challenges range from credential theft and ransomware to data manipulation, ethics of AI and denial-of-service attacks.<\/p>\n\n\n\n<p>At the heart of CyberNEMO is a\u00a0<strong>meta-operating system (meta-OS)<\/strong>\u00a0that orchestrates secure interactions across the CC. This system integrates:<\/p>\n\n\n\n<ul class=\"ul-custom\">\n \t<li>\n<p lang=\"en-GB\"><strong>Zero Trust Network Access (ZTNA)<\/strong>: Every device, user, and service is treated as untrusted by default.<\/p>\n<\/li>\n \t<li>\n<p lang=\"en-GB\"><strong>Federated Machine Learning (FML)<\/strong>: Enables decentralized threat detection without compromising data privacy.<\/p>\n<\/li>\n \t<li>\n<p lang=\"en-GB\"><strong>Secure Access Service Edge (SASE)<\/strong>: Ensures secure connectivity across heterogeneous networks.<\/p>\n<\/li>\n<li>\n<p lang=\"en-GB\"><strong>Digital Twins and Blockchain<\/strong>: Provide traceability, auditability, and resilience in supply chains\u00a0<\/p>\n<\/li>\n<\/ul>\n\n\n\n<p>This architecture is designed to be&nbsp;<strong>ethics-by-conception,<\/strong> <strong>modular, scalable, and interoperable<\/strong>, supporting a wide range of use cases and regulatory contexts<\/p>\n\n\n\n<p>CyberNEMO is not just about technology, it\u2019s about building a secure, ethical, and resilient digital future.<\/p>\n\n\n\n<p>You can explore the official project page on the\u00a0<a href=\"https:\/\/cordis.europa.eu\/project\/id\/101168182\" target=\"_blank\" rel=\"noreferrer noopener\">EU CORDIS portal<\/a>\u00a0or follow updates from the coordinating partner\u00a0<a href=\"https:\/\/synelixis.com\/portfolios\/cybernemo\/\" target=\"_blank\" rel=\"noreferrer noopener\">Synelixis<\/a>\u00a0<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s hyperconnected world, the\u00a0Computing Continuum (CC)\u2014spanning IoT devices, edge computing, and cloud infrastructure\u2014presents both unprecedented opportunities and complex cybersecurity challenges. The\u00a0CyberNEMO project, funded by the European Union\u2019s Horizon Europe programme, is tackling this head-on with an end-to-end cybersecurity approach &hellip;<\/p>\n","protected":false},"author":4,"featured_media":4483,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"_mi_skip_tracking":false,"footnotes":""},"categories":[17],"tags":[],"cc_featured_image_caption":{"caption_text":"","source_text":"","source_url":""},"_links":{"self":[{"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/posts\/4482"}],"collection":[{"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/comments?post=4482"}],"version-history":[{"count":1,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/posts\/4482\/revisions"}],"predecessor-version":[{"id":4484,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/posts\/4482\/revisions\/4484"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/media\/4483"}],"wp:attachment":[{"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/media?parent=4482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/categories?post=4482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/tags?post=4482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}