Projects
Projects about
#ICIL4

Proeftuin ICIL4.0
The Living Lab ICI4.0 has taught us that a translation of a legal text of a regulation such as the NIS should proceed in 2 phases namely we need to provide a management / business approach (provided budget) with the focus what does it bring to the business and a technology approach (use budget).
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
News about
#ICIL4

Behind the Hack: the Unlocked Storage Container
A public dirt road led us straight to an unlocked storage container. Once inside, we plugged in a computer, scanned the network, found a PLC and rebooted it. This stopping a crane without any alerts. No passwords, no monitoring, no barriers.

Behind the Hack: How Audio Visual Equipment like ClickShare became a Hacker's Gateway
In a recent ethical hacking test, we gained full access to a company’s internal network... by simply plugging our laptop into their ClickShare assigned Ethernet port in one of their conference rooms. Your weakest link may be hiding behind your projector.

Behind the Hack: the Conference Room Laptop
This is the story of a public guest laptop in a conference room where they offered hands-on product demos. It became the gateway for a full-scale corporate breach by our ethical hackers. The servers were secured. Employees used strong passwords. The network had a firewall. Still, we hacked their internal network.
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
Explore by topic
- #3D
- #5G
- #Administration
- #Agentic AI
- #AI Act
- #AI Agents
- #AI in cybersecurity
- #AI in energy
- #AI in health
- #AI legislation
- #AI risks
- #Android Development
- #Artificial Intelligence
- #Backend Development
- #Big Data
- #Blockchain
- #Blue economy
- #Business innovation
- #Business Model Canvas
- #Business plans
- #Circular economy
- #Community Building
- #Computer Vision
- #Cryptography
- #Cybersecurity
- #CyFun
- #Decentralized Identity
- #DeFi
- #DevOps
- #Digital Europe
- #digital identity
- #Digital Product Passports
- #Digital transformation
- #Digital Trust
- #Digital Twins
- #DigitalHealth
- #DLT
- #DPP
- #drones
- #EBSI
- #EFRO
- #Encryption
- #Energy
- #Ethical Hacking
- #EU Business Wallets
- #EU Regulation
- #EUDI
- #Experience Labs
- #Finance
- #Flutter Development
- #Food
- #Generative AI
- #Go to market
- #Hackathon
- #Hyperledger
- #ICIL4
- #Immersive Tech
- #Interactive Installations
- #International project
- #Internship
- #IOS Development
- #IT infrastructure
- #IT Security
- #LF Decentralized Trust
- #LFDT
- #Linux
- #LLM RAGS
- #Maritime Cybersecurity
- #Masterclasses
- #Meetups
- #Metaverse
- #Nanopore sequencing
- #Networking Events
- #NFTs
- #NIS2
- #Open Source
- #OT Security
- #Pentesting
- #Project Management
- #Public sector
- #Quantum Computing
- #Ransomware
- #Regulation
- #Secure AI
- #Security Operations Center
- #Self Sovereign Identity
- #Smart City
- #SME
- #Software Engineering
- #Solid
- #Start-ups
- #Sustainability
- #System Engineer
- #Tokenisation
- #User group meetings
- #UX/UI
- #Virtual Reality
- #VLAIO
- #Web Development
- #Web3
- #Web3Finance
- #XR
- #yolo-v8