{"id":13645,"date":"2026-03-25T11:28:15","date_gmt":"2026-03-25T11:28:15","guid":{"rendered":"https:\/\/k3ylabs.com\/?p=13645"},"modified":"2026-04-02T10:06:30","modified_gmt":"2026-04-02T10:06:30","slug":"cipher","status":"publish","type":"post","link":"https:\/\/k3ylabs.com\/el\/research-development\/projects\/cipher\/","title":{"rendered":"CIPHER"},"content":{"rendered":"<div id=\"pl-13645\"  class=\"panel-layout\" ><div id=\"pg-13645-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-13645-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-13645-0-0-0\" class=\"so-panel widget widget_fk-text-blocks panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-fk-text-blocks so-widget-fk-text-blocks-default-d75171398898-13645\"\n\t\t\t\n\t\t>\n<div class=\"textblocks-container\">\n  <div class=\"textblocks-inner\">\n    <div class=\"textblocks-wrap\">\n              <div class=\"textblocks-single\">\n          <div class=\"textblocks-single-inner\">\n              <h3 class=\"textblocks-single-title\">Project Objective<\/h3>\n              <div class=\"textblocks-single-infos\">\n                <div class=\"textblocks-single-description\">\n                  <p>CIPHER project (Cybersecurity Intelligence, Protection, and Holistic Enterprise Resilience) aims to tackle and provide demonstrable solutions for security and information assurance in critical sectors by developing a collaborative, standardized and available-as-a-service testing facility for security strategies and enablers qualification contributing and aiming at fostering the compliance with the EU\u2019s cybersecurity strategy for the Digital Decade. CIPHER\u2019s laboratory develops and integrates an experimentation laboratory serving pre-emptive security capability contributing to increased preparedness. The project envisions associating a fabric of solution providers, essential service operators, and external auditors to build adapted, efficient and compliant security measures contributing to preparedness. CIPHER adopts a demanding evaluation strategy by involving in its consortium three internal use-case providers contributing to programmatic requirements identification and internal validation, and a two-step financial support to third party campaigns to deploy the CIPHER platform in real case validation settings. Communication Dissemination, Exploitation and Stakeholder Engagement activities ensure that preliminary and final project results are effectively shared with relevant ecosystems and communities.<\/p>\n                <\/div>\n                              <\/div>\n          <\/div>\n        <\/div>\n        <hr class=\"cyberservices-divider\">\n          <\/div>\n  <\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Intelligence, Protection, and Holistic Enterprise Resilience<\/p>","protected":false},"author":4,"featured_media":13646,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-13645","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-projects","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CIPHER - k3y<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/k3ylabs.com\/el\/research-development\/projects\/cipher\/\" \/>\n<meta property=\"og:locale\" content=\"el_GR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CIPHER - k3y\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity Intelligence, Protection, and Holistic Enterprise Resilience\" \/>\n<meta property=\"og:url\" content=\"https:\/\/k3ylabs.com\/el\/research-development\/projects\/cipher\/\" \/>\n<meta property=\"og:site_name\" content=\"k3y\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-25T11:28:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-02T10:06:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/k3ylabs.com\/wp-content\/uploads\/2026\/03\/CIPHER_LogoTag_DarkBackground@5x-scaled.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1206\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"k3y news\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u03a3\u03c5\u03bd\u03c4\u03ac\u03c7\u03b8\u03b7\u03ba\u03b5 \u03b1\u03c0\u03cc\" \/>\n\t<meta name=\"twitter:data1\" content=\"k3y news\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0395\u03ba\u03c4\u03b9\u03bc\u03ce\u03bc\u03b5\u03bd\u03bf\u03c2 \u03c7\u03c1\u03cc\u03bd\u03bf\u03c2 \u03b1\u03bd\u03ac\u03b3\u03bd\u03c9\u03c3\u03b7\u03c2\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 \u03bb\u03b5\u03c0\u03c4\u03cc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/research-development\\\/projects\\\/cipher\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/research-development\\\/projects\\\/cipher\\\/\"},\"author\":{\"name\":\"k3y news\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/9c622781378c531311096a78feb83f04\"},\"headline\":\"CIPHER\",\"datePublished\":\"2026-03-25T11:28:15+00:00\",\"dateModified\":\"2026-04-02T10:06:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/research-development\\\/projects\\\/cipher\\\/\"},\"wordCount\":9,\"image\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/research-development\\\/projects\\\/cipher\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/CIPHER_LogoTag_DarkBackground@5x-scaled.png\",\"articleSection\":[\"Project\"],\"inLanguage\":\"el\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/research-development\\\/projects\\\/cipher\\\/\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/research-development\\\/projects\\\/cipher\\\/\",\"name\":\"CIPHER - k3y\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/research-development\\\/projects\\\/cipher\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/research-development\\\/projects\\\/cipher\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/CIPHER_LogoTag_DarkBackground@5x-scaled.png\",\"datePublished\":\"2026-03-25T11:28:15+00:00\",\"dateModified\":\"2026-04-02T10:06:30+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/9c622781378c531311096a78feb83f04\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/research-development\\\/projects\\\/cipher\\\/#breadcrumb\"},\"inLanguage\":\"el\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/k3ylabs.com\\\/research-development\\\/projects\\\/cipher\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"el\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/research-development\\\/projects\\\/cipher\\\/#primaryimage\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/CIPHER_LogoTag_DarkBackground@5x-scaled.png\",\"contentUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/CIPHER_LogoTag_DarkBackground@5x-scaled.png\",\"width\":2560,\"height\":1206},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/research-development\\\/projects\\\/cipher\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/k3ylabs.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CIPHER\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#website\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/\",\"name\":\"k3y\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/k3ylabs.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"el\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/9c622781378c531311096a78feb83f04\",\"name\":\"k3y news\",\"sameAs\":[\"https:\\\/\\\/deasytal.com\\\/\"],\"url\":\"https:\\\/\\\/k3ylabs.com\\\/el\\\/author\\\/k3y\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CIPHER - k3y","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/k3ylabs.com\/el\/research-development\/projects\/cipher\/","og_locale":"el_GR","og_type":"article","og_title":"CIPHER - k3y","og_description":"Cybersecurity Intelligence, Protection, and Holistic Enterprise Resilience","og_url":"https:\/\/k3ylabs.com\/el\/research-development\/projects\/cipher\/","og_site_name":"k3y","article_published_time":"2026-03-25T11:28:15+00:00","article_modified_time":"2026-04-02T10:06:30+00:00","og_image":[{"width":2560,"height":1206,"url":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2026\/03\/CIPHER_LogoTag_DarkBackground@5x-scaled.png","type":"image\/png"}],"author":"k3y news","twitter_card":"summary_large_image","twitter_misc":{"\u03a3\u03c5\u03bd\u03c4\u03ac\u03c7\u03b8\u03b7\u03ba\u03b5 \u03b1\u03c0\u03cc":"k3y news","\u0395\u03ba\u03c4\u03b9\u03bc\u03ce\u03bc\u03b5\u03bd\u03bf\u03c2 \u03c7\u03c1\u03cc\u03bd\u03bf\u03c2 \u03b1\u03bd\u03ac\u03b3\u03bd\u03c9\u03c3\u03b7\u03c2":"1 \u03bb\u03b5\u03c0\u03c4\u03cc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/k3ylabs.com\/research-development\/projects\/cipher\/#article","isPartOf":{"@id":"https:\/\/k3ylabs.com\/research-development\/projects\/cipher\/"},"author":{"name":"k3y news","@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/9c622781378c531311096a78feb83f04"},"headline":"CIPHER","datePublished":"2026-03-25T11:28:15+00:00","dateModified":"2026-04-02T10:06:30+00:00","mainEntityOfPage":{"@id":"https:\/\/k3ylabs.com\/research-development\/projects\/cipher\/"},"wordCount":9,"image":{"@id":"https:\/\/k3ylabs.com\/research-development\/projects\/cipher\/#primaryimage"},"thumbnailUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2026\/03\/CIPHER_LogoTag_DarkBackground@5x-scaled.png","articleSection":["Project"],"inLanguage":"el"},{"@type":"WebPage","@id":"https:\/\/k3ylabs.com\/research-development\/projects\/cipher\/","url":"https:\/\/k3ylabs.com\/research-development\/projects\/cipher\/","name":"CIPHER - k3y","isPartOf":{"@id":"https:\/\/k3ylabs.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/k3ylabs.com\/research-development\/projects\/cipher\/#primaryimage"},"image":{"@id":"https:\/\/k3ylabs.com\/research-development\/projects\/cipher\/#primaryimage"},"thumbnailUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2026\/03\/CIPHER_LogoTag_DarkBackground@5x-scaled.png","datePublished":"2026-03-25T11:28:15+00:00","dateModified":"2026-04-02T10:06:30+00:00","author":{"@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/9c622781378c531311096a78feb83f04"},"breadcrumb":{"@id":"https:\/\/k3ylabs.com\/research-development\/projects\/cipher\/#breadcrumb"},"inLanguage":"el","potentialAction":[{"@type":"ReadAction","target":["https:\/\/k3ylabs.com\/research-development\/projects\/cipher\/"]}]},{"@type":"ImageObject","inLanguage":"el","@id":"https:\/\/k3ylabs.com\/research-development\/projects\/cipher\/#primaryimage","url":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2026\/03\/CIPHER_LogoTag_DarkBackground@5x-scaled.png","contentUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2026\/03\/CIPHER_LogoTag_DarkBackground@5x-scaled.png","width":2560,"height":1206},{"@type":"BreadcrumbList","@id":"https:\/\/k3ylabs.com\/research-development\/projects\/cipher\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/k3ylabs.com\/"},{"@type":"ListItem","position":2,"name":"CIPHER"}]},{"@type":"WebSite","@id":"https:\/\/k3ylabs.com\/#website","url":"https:\/\/k3ylabs.com\/","name":"k3y","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/k3ylabs.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"el"},{"@type":"Person","@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/9c622781378c531311096a78feb83f04","name":"k3y news","sameAs":["https:\/\/deasytal.com\/"],"url":"https:\/\/k3ylabs.com\/el\/author\/k3y\/"}]}},"_links":{"self":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/13645","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/comments?post=13645"}],"version-history":[{"count":2,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/13645\/revisions"}],"predecessor-version":[{"id":13648,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/13645\/revisions\/13648"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/media\/13646"}],"wp:attachment":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/media?parent=13645"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/categories?post=13645"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/tags?post=13645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}