{"id":3191,"date":"2025-08-08T16:59:45","date_gmt":"2025-08-08T16:59:45","guid":{"rendered":"https:\/\/scienceblog.com\/horizon\/?p=3191"},"modified":"2025-08-08T16:59:45","modified_gmt":"2025-08-08T16:59:45","slug":"from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future","status":"publish","type":"post","link":"https:\/\/scienceblog.com\/horizon\/3191\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\/","title":{"rendered":"From medieval stronghold to cyber fortress: shielding Europe\u2019s digital future"},"content":{"rendered":"<p>Czech and Estonian researchers are joining forces to build a cross-border cybersecurity hub that will strengthen Europe\u2019s digital defences in the face of growing cyber threats.<\/p>\n<p><em>By<\/em> Michaela Nesvarova<\/p>\n<p>The unmistakable silhouette of \u0160pilberk Castle towers over Brno, the largest city in Czechia\u2019s South Moravia region. From this medieval stronghold, you can spot the buildings of Masaryk University nestled below.<\/p>\n<p>It was here, at the foot of this centuries-old fortress, that local computer scientists first had the idea to strengthen the defences of Europe\u2019s digital realm by setting up a cross-border cybersecurity hub.<\/p>\n<p>\u201cIt\u2019s actually a very simple story,\u201d said Vashek Maty\u00e1\u0161, professor of computer science at Masaryk University. The university and its partners in South Moravia were already renowned for their ICT, education and cybersecurity research, and they wanted to take their work a step further.<\/p>\n<p>\u201cOnce we started searching for a partner, we quickly realised that Estonia was the clear choice,\u201d said Maty\u00e1\u0161.<\/p>\n<p>Estonia is among the world\u2019s most advanced digital societies, boasting one of the most advanced e-government systems. A partnership between the two countries was, therefore, a natural fit.<\/p>\n<p><strong>A cybersecurity excellence hub<\/strong><\/p>\n<p>In 2023, leading institutes from both countries launched CHESS \u2013 the Cyber-security Excellence Hub in Estonia and South Moravia.<\/p>\n<p>Supported by the EU, and running until at least 2026, the CHESS team focuses on advancing cybersecurity through cutting-edge research, practical tools and education.<\/p>\n<p>Setting up these European excellence hubs is crucial, said Maty\u00e1\u0161, who coordinates the hub\u2019s activities.<\/p>\n<p>\u201cWhile there are areas where the EU is strong, too many cybersecurity solutions still come from outside Europe. We need to strengthen our own position in this field.\u201d<\/p>\n<p>The CHESS team is focusing on identifying strengths and gaps in six key areas: the Internet of Secure Things, security certification, verification of trustworthy software, security preservation in blockchain, post-quantum cryptography and the human-centric aspects of cybersecurity.<\/p>\n<p>The teams in Czechia and Estonia each bring their own distinct strengths.<\/p>\n<p>\u201cOur expertise is complementary, but there are areas in which we can learn from each other. In Moravia, we excel in human factors in security,\u201d says Maty\u00e1\u0161. \u201cEstonia, on the other hand, has a strong expertise in the security of e-government solutions, for instance.\u201d<\/p>\n<p><strong>Preparing for a quantum future<\/strong><\/p>\n<p>One challenge keeping CHESS experts on their toes is post-quantum cryptography. Put simply, they are working to ensure that our data remains safe from the ultra-fast quantum computers of the future.<\/p>\n<p>\u201cWe are assessing which cryptographic methods to use in case quantum computers evolve to the point they can bypass our current encryption methods,\u201d said Maty\u00e1\u0161.<\/p>\n<p>\u201cThis isn\u2019t a threat yet, but we need to think about this now because data needs to be kept safe for decades to come.\u201d<\/p>\n<p>Liina Kamm, an Estonian expert in privacy-enhancing technologies, warns that quantum computing could one day make current encryption obsolete.<\/p>\n<p>\u201cThe encryption methods we use today rely on large prime numbers and are very difficult to break with existing computers,\u201d she said. \u201cBut for quantum computers, it could become much easier.\u201d<\/p>\n<p>Sensitive data, such as health and legal records, could be compromised if current cryptographic methods fail. That is why CHESS researchers are exploring new encryption standards that quantum computers cannot break.<\/p>\n<p><strong>The weak human link<\/strong><\/p>\n<p>Quantum threats may lie ahead, but the most immediate cybersecurity risk is much more human.<\/p>\n<p>\u201cThe biggest danger is users,\u201d said Maty\u00e1\u0161. \u201cThe human factor is a major concern \u2013 and something we take very seriously.\u201d<\/p>\n<p>Kamm agreed. \u201cThe main cybersecurity threat is the carelessness of people,\u201d she said. \u201cWe can build the safest systems, but if someone writes their password on a sticky note next to their computer, it\u2019s all for nothing.\u201d<\/p>\n<p>The solution? Education.<\/p>\n<p>\u201cCybersecurity awareness is essential,\u201d said Kamm. \u201cThat\u2019s why education is a core part of what CHESS does.\u201d<\/p>\n<p><strong>Turning research into real-world tools<\/strong><\/p>\n<p>The collaboration has already delivered several practical applications that companies can use to test the safety of their systems.<\/p>\n<p>One tool developed by Estonian partners is a cybersecurity self-assessment standard. This is a user-friendly checklist that gives organisations immediate feedback on strengths and areas for improvement.<\/p>\n<p>\u201cWe have tested it in Czechia, and we are in serious discussions about rolling it out across the country,\u201d said Maty\u00e1\u0161. In the future, schools, hospitals and companies across Czechia may use the tool to boost their cybersecurity standards.<\/p>\n<p>The CHESS partners want to make guidance on cybersecurity more accessible \u2013 and therefore more helpful to people. By the end of 2025, they will publish an\u00a0action plan\u00a0with concrete recommendations for improving cybersecurity in Estonia, Czechia, and across the EU.<\/p>\n<p>\u201cI believe CHESS can help Europe become more cyber secure,\u201d said Kamm. \u201cIt works on big-picture research and day-to-day challenges. It deepens our understanding and gives us tools people can actually use.\u201d<\/p>\n<p>Beyond its research outcomes, the CHESS collaboration has also boosted the international profile of Masaryk University. \u201cIt has moved us to a different level,\u201d said Maty\u00e1\u0161.<\/p>\n<p>The next step? The research team is now expanding its partner base to bring in new universities, companies, governmental institutions and other associations across Europe.<\/p>\n<p>\u201cWe want to make sure that our research is used,\u201d said Maty\u00e1\u0161, \u201cand that the expertise of all our partners becomes widely known.\u201d<\/p>\n<p><em>Research in this article was funded by the EU\u2019s Horizon Programme. The views of the interviewees don\u2019t necessarily reflect those of the European Commission. <\/em><\/p>\n<p><em>\u200bThis article was originally published\u202fin\u00a0<a href=\"https:\/\/projects.research-and-innovation.ec.europa.eu\/en\/horizon-magazine\">Horizon<\/a>\u00a0the EU Research and Innovation Magazine.<\/em><\/p>\n<p>More info<\/p>\n<ul>\n<li><a href=\"https:\/\/cordis.europa.eu\/project\/id\/101087529\">CHESS<\/a><\/li>\n<li><a href=\"https:\/\/chess-eu.cs.ut.ee\/\">CHESS project website<\/a><\/li>\n<li><a href=\"https:\/\/commission.europa.eu\/strategy-and-policy\/priorities-2019-2024\/europe-fit-digital-age_en\">EU Digital Strategy<\/a><\/li>\n<li><a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/cybersecurity-strategy\">EU Cybersecurity Strategy<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Czech and Estonian researchers are joining forces to build a cross-border cybersecurity hub that will strengthen Europe\u2019s digital defences in the face of growing cyber threats. By Michaela Nesvarova The unmistakable silhouette of \u0160pilberk Castle towers over Brno, the largest city in Czechia\u2019s South Moravia region. From this medieval stronghold, you can spot the buildings &#8230; <a title=\"From medieval stronghold to cyber fortress: shielding Europe\u2019s digital future\" class=\"read-more\" href=\"https:\/\/scienceblog.com\/horizon\/3191\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\/\" aria-label=\"Read more about From medieval stronghold to cyber fortress: shielding Europe\u2019s digital future\">Read more<\/a><\/p>\n","protected":false},"author":298,"featured_media":3192,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"generate_page_header":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[112],"tags":[],"class_list":["post-3191","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ict"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>From medieval stronghold to cyber fortress: shielding Europe\u2019s digital future - Horizon Magazine Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/scienceblog.com\/horizon\/3191\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From medieval stronghold to cyber fortress: shielding Europe\u2019s digital future\" \/>\n<meta property=\"og:description\" content=\"Czech and Estonian researchers are joining forces to build a cross-border cybersecurity hub that will strengthen Europe\u2019s digital defences in the face of growing cyber threats. By Michaela Nesvarova The unmistakable silhouette of \u0160pilberk Castle towers over Brno, the largest city in Czechia\u2019s South Moravia region. From this medieval stronghold, you can spot the buildings ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/scienceblog.com\/horizon\/3191\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\/\" \/>\n<meta property=\"og:site_name\" content=\"Horizon Magazine Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/horizon.magazine.eu\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-08T16:59:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/07.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"218\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Horizon Magazine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/HorizonMagEU\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Horizon Magazine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3191\\\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3191\\\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\\\/\"},\"author\":{\"name\":\"Horizon Magazine\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#\\\/schema\\\/person\\\/8f23522ba58f477f04dd574e1034f679\"},\"headline\":\"From medieval stronghold to cyber fortress: shielding Europe\u2019s digital future\",\"datePublished\":\"2025-08-08T16:59:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3191\\\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\\\/\"},\"wordCount\":932,\"publisher\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3191\\\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2025\\\/08\\\/07.jpg\",\"articleSection\":[\"ICT\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3191\\\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\\\/\",\"url\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3191\\\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\\\/\",\"name\":\"From medieval stronghold to cyber fortress: shielding Europe\u2019s digital future - Horizon Magazine Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3191\\\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3191\\\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2025\\\/08\\\/07.jpg\",\"datePublished\":\"2025-08-08T16:59:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3191\\\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3191\\\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3191\\\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\\\/#primaryimage\",\"url\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2025\\\/08\\\/07.jpg\",\"contentUrl\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2025\\\/08\\\/07.jpg\",\"width\":900,\"height\":218,\"caption\":\"A new cybersecurity hub led by EU-funded researchers aims to boost Europe\u2019s resilience against cyber-attacks. \u00a9 Thapana_Studio, Shutterstock.com\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3191\\\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From medieval stronghold to cyber fortress: shielding Europe\u2019s digital future\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#website\",\"url\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/\",\"name\":\"Horizon Magazine Blog\",\"description\":\"The EU Research &amp; Innovation Magazine\",\"publisher\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#organization\",\"name\":\"Horizon Magazine Blog\",\"url\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2024\\\/12\\\/horizon-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2024\\\/12\\\/horizon-logo.jpg\",\"width\":800,\"height\":391,\"caption\":\"Horizon Magazine Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#\\\/schema\\\/person\\\/8f23522ba58f477f04dd574e1034f679\",\"name\":\"Horizon Magazine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/407bd816be829798850d5e7f646c4137f70c86c6af6c761b67a6ea80c364ffa4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/407bd816be829798850d5e7f646c4137f70c86c6af6c761b67a6ea80c364ffa4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/407bd816be829798850d5e7f646c4137f70c86c6af6c761b67a6ea80c364ffa4?s=96&d=mm&r=g\",\"caption\":\"Horizon Magazine\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/horizon.magazine.eu\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/HorizonMagEU\"],\"url\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/author\\\/horizonmagazine\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"From medieval stronghold to cyber fortress: shielding Europe\u2019s digital future - Horizon Magazine Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/scienceblog.com\/horizon\/3191\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\/","og_locale":"en_US","og_type":"article","og_title":"From medieval stronghold to cyber fortress: shielding Europe\u2019s digital future","og_description":"Czech and Estonian researchers are joining forces to build a cross-border cybersecurity hub that will strengthen Europe\u2019s digital defences in the face of growing cyber threats. By Michaela Nesvarova The unmistakable silhouette of \u0160pilberk Castle towers over Brno, the largest city in Czechia\u2019s South Moravia region. From this medieval stronghold, you can spot the buildings ... Read more","og_url":"https:\/\/scienceblog.com\/horizon\/3191\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\/","og_site_name":"Horizon Magazine Blog","article_author":"https:\/\/www.facebook.com\/horizon.magazine.eu","article_published_time":"2025-08-08T16:59:45+00:00","og_image":[{"width":900,"height":218,"url":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/07.jpg","type":"image\/jpeg"}],"author":"Horizon Magazine","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/HorizonMagEU","twitter_misc":{"Written by":"Horizon Magazine","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/scienceblog.com\/horizon\/3191\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\/#article","isPartOf":{"@id":"https:\/\/scienceblog.com\/horizon\/3191\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\/"},"author":{"name":"Horizon Magazine","@id":"https:\/\/scienceblog.com\/horizon\/#\/schema\/person\/8f23522ba58f477f04dd574e1034f679"},"headline":"From medieval stronghold to cyber fortress: shielding Europe\u2019s digital future","datePublished":"2025-08-08T16:59:45+00:00","mainEntityOfPage":{"@id":"https:\/\/scienceblog.com\/horizon\/3191\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\/"},"wordCount":932,"publisher":{"@id":"https:\/\/scienceblog.com\/horizon\/#organization"},"image":{"@id":"https:\/\/scienceblog.com\/horizon\/3191\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\/#primaryimage"},"thumbnailUrl":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/07.jpg","articleSection":["ICT"],"inLanguage":"en-US","copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/scienceblog.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/scienceblog.com\/horizon\/3191\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\/","url":"https:\/\/scienceblog.com\/horizon\/3191\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\/","name":"From medieval stronghold to cyber fortress: shielding Europe\u2019s digital future - Horizon Magazine Blog","isPartOf":{"@id":"https:\/\/scienceblog.com\/horizon\/#website"},"primaryImageOfPage":{"@id":"https:\/\/scienceblog.com\/horizon\/3191\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\/#primaryimage"},"image":{"@id":"https:\/\/scienceblog.com\/horizon\/3191\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\/#primaryimage"},"thumbnailUrl":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/07.jpg","datePublished":"2025-08-08T16:59:45+00:00","breadcrumb":{"@id":"https:\/\/scienceblog.com\/horizon\/3191\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/scienceblog.com\/horizon\/3191\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/scienceblog.com\/horizon\/3191\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\/#primaryimage","url":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/07.jpg","contentUrl":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/07.jpg","width":900,"height":218,"caption":"A new cybersecurity hub led by EU-funded researchers aims to boost Europe\u2019s resilience against cyber-attacks. \u00a9 Thapana_Studio, Shutterstock.com"},{"@type":"BreadcrumbList","@id":"https:\/\/scienceblog.com\/horizon\/3191\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/scienceblog.com\/horizon\/"},{"@type":"ListItem","position":2,"name":"From medieval stronghold to cyber fortress: shielding Europe\u2019s digital future"}]},{"@type":"WebSite","@id":"https:\/\/scienceblog.com\/horizon\/#website","url":"https:\/\/scienceblog.com\/horizon\/","name":"Horizon Magazine Blog","description":"The EU Research &amp; Innovation Magazine","publisher":{"@id":"https:\/\/scienceblog.com\/horizon\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/scienceblog.com\/horizon\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/scienceblog.com\/horizon\/#organization","name":"Horizon Magazine Blog","url":"https:\/\/scienceblog.com\/horizon\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/scienceblog.com\/horizon\/#\/schema\/logo\/image\/","url":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/12\/horizon-logo.jpg","contentUrl":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/12\/horizon-logo.jpg","width":800,"height":391,"caption":"Horizon Magazine Blog"},"image":{"@id":"https:\/\/scienceblog.com\/horizon\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/scienceblog.com\/horizon\/#\/schema\/person\/8f23522ba58f477f04dd574e1034f679","name":"Horizon Magazine","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/407bd816be829798850d5e7f646c4137f70c86c6af6c761b67a6ea80c364ffa4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/407bd816be829798850d5e7f646c4137f70c86c6af6c761b67a6ea80c364ffa4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/407bd816be829798850d5e7f646c4137f70c86c6af6c761b67a6ea80c364ffa4?s=96&d=mm&r=g","caption":"Horizon Magazine"},"sameAs":["https:\/\/www.facebook.com\/horizon.magazine.eu","https:\/\/x.com\/https:\/\/twitter.com\/HorizonMagEU"],"url":"https:\/\/scienceblog.com\/horizon\/author\/horizonmagazine\/"}]}},"jetpack_featured_media_url":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/07.jpg","jetpack_shortlink":"https:\/\/wp.me\/pgtNKV-Pt","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":2287,"url":"https:\/\/scienceblog.com\/horizon\/2287\/european-cybersecurity-is-getting-its-own-legs-to-stand-on\/","url_meta":{"origin":3191,"position":0},"title":"European cybersecurity is getting its own legs to stand on","author":"Horizon Magazine","date":"February 8, 2023","format":false,"excerpt":"In February last year, as oil prices spiked following Russia\u2019s invasion of Ukraine, computers stopped working at the Amsterdam-Rotterdam-Antwerp oil trading hub. This group of terminals concentrated at some of Europe's biggest ports had fallen victim to a\u00a0cyberattack. Barges couldn't be unloaded and supply was disrupted. Cyberattacks on critical infrastructure\u2026","rel":"","context":"In &quot;ICT&quot;","block_context":{"text":"ICT","link":"https:\/\/scienceblog.com\/horizon\/category\/ict\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/02\/shutterstocks_1916985977.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/02\/shutterstocks_1916985977.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/02\/shutterstocks_1916985977.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/02\/shutterstocks_1916985977.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/02\/shutterstocks_1916985977.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/02\/shutterstocks_1916985977.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":2680,"url":"https:\/\/scienceblog.com\/horizon\/2680\/researchers-and-small-businesses-join-forces-against-hackers\/","url_meta":{"origin":3191,"position":1},"title":"Researchers and small businesses join forces against hackers","author":"Horizon Magazine","date":"February 22, 2024","format":false,"excerpt":"Improved cybersecurity defences for electronic commerce have emerged from EU-funded projects. By \u00a0Tom Cassauwers What do a Greek pharmacy, a Spanish multinational bank, a German foundation specialised in the digital economy and a UK university have in common? They all helped develop software tools with EU funding to counter cyber\u2026","rel":"","context":"In &quot;ICT&quot;","block_context":{"text":"ICT","link":"https:\/\/scienceblog.com\/horizon\/category\/ict\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/02\/22.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/02\/22.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/02\/22.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/02\/22.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/02\/22.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/02\/22.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":3433,"url":"https:\/\/scienceblog.com\/horizon\/3433\/from-fragmented-to-connected-a-shared-hub-for-europes-ai\/","url_meta":{"origin":3191,"position":2},"title":"From fragmented to connected: a shared hub for Europe\u2019s AI","author":"Horizon Magazine","date":"February 27, 2026","format":false,"excerpt":"Europe\u2019s AI researchers are joining forces through an EU-funded digital platform that allows them to share tools, data and computing power to drive collaboration and innovation. By Michael Allen Across Europe, researchers are using AI to tackle everything from underwater noise pollution to media fact-checking and smarter farming. Until recently,\u2026","rel":"","context":"In &quot;ICT&quot;","block_context":{"text":"ICT","link":"https:\/\/scienceblog.com\/horizon\/category\/ict\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2871,"url":"https:\/\/scienceblog.com\/horizon\/2871\/guardians-of-the-grid-protecting-europes-electricity-supply-from-cyber-attacks\/","url_meta":{"origin":3191,"position":3},"title":"Guardians of the grid \u2013 protecting Europe\u2019s electricity supply from cyber-attacks","author":"Horizon Magazine","date":"October 3, 2024","format":false,"excerpt":"EU-funded researchers are fortifying Europe\u2019s electricity sector against increasingly sophisticated attacks by cybercriminals. By Michael Allen In the past decade, cyber-attacks on Europe\u2019s power infrastructure have intensified so much that energy companies, experts and politicians called for help. Researchers came together to boost the resilience of European energy networks. The\u2026","rel":"","context":"In &quot;Earth, Energy &amp; Environment&quot;","block_context":{"text":"Earth, Energy &amp; Environment","link":"https:\/\/scienceblog.com\/horizon\/category\/earth-energy-environment\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/10\/03.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/10\/03.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/10\/03.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/10\/03.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/10\/03.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/10\/03.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":2853,"url":"https:\/\/scienceblog.com\/horizon\/2853\/europes-musical-and-cultural-heritage-at-your-fingertips\/","url_meta":{"origin":3191,"position":4},"title":"Europe\u2019s musical and cultural heritage at your fingertips","author":"Horizon Magazine","date":"September 12, 2024","format":false,"excerpt":"EU-funded researchers are using the latest digital technologies to improve access to Europe\u2019s rich musical and cultural heritage and facilitate the creation of new cultural connections. By Ali Jones With all the fanfare of the Eurovision Song Contest in May this year, it is possible that many missed another European\u2026","rel":"","context":"In &quot;ICT&quot;","block_context":{"text":"ICT","link":"https:\/\/scienceblog.com\/horizon\/category\/ict\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/09\/12.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/09\/12.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/09\/12.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/09\/12.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/09\/12.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/09\/12.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":2385,"url":"https:\/\/scienceblog.com\/horizon\/2385\/the-race-to-make-hospitals-cybersecure\/","url_meta":{"origin":3191,"position":5},"title":"The race to make hospitals cybersecure","author":"Horizon Magazine","date":"May 24, 2023","format":false,"excerpt":"As medical centres increasingly come under attack from hackers, Europe is bolstering protection. By\u00a0TOM CASSAUWERS Amid the Covid-19 pandemic in early 2021, the Irish healthcare system\u2019s computers were breached by hackers who gained access to patient files and posted hundreds of them online. As a result, the network had to\u2026","rel":"","context":"In &quot;Health&quot;","block_context":{"text":"Health","link":"https:\/\/scienceblog.com\/horizon\/category\/health\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/05\/24.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/05\/24.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/05\/24.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/05\/24.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/posts\/3191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/users\/298"}],"replies":[{"embeddable":true,"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/comments?post=3191"}],"version-history":[{"count":1,"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/posts\/3191\/revisions"}],"predecessor-version":[{"id":3193,"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/posts\/3191\/revisions\/3193"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/media\/3192"}],"wp:attachment":[{"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/media?parent=3191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/categories?post=3191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/tags?post=3191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}