{"id":107548,"date":"2026-02-05T10:59:47","date_gmt":"2026-02-05T09:59:47","guid":{"rendered":"https:\/\/monetplus.cz\/?page_id=107548"},"modified":"2026-03-11T13:08:05","modified_gmt":"2026-03-11T12:08:05","slug":"the-ccat-project","status":"publish","type":"page","link":"https:\/\/monetplus.cz\/en\/the-ccat-project\/","title":{"rendered":"The CCAT Project"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"107548\" class=\"elementor elementor-107548 elementor-107442\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-993ffa8 top-space elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"993ffa8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\" elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a434338 elementor-invisible\" data-fullscreen-column-settings=\"{&quot;fullscreen&quot;:&quot;&quot;}\" data-id=\"a434338\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8aaf4b7 elementor-widget elementor-widget-litho-heading\" data-id=\"8aaf4b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"litho-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"litho-heading elementor-size-default\"><span class=\"litho-primary-title\">CCAT: European Research Project<\/span><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-parallax-section-settings=\"{&quot;parallax_ratio&quot;:0.5,&quot;parallax&quot;:&quot;parallax&quot;}\" class=\"elementor-section elementor-top-section elementor-element elementor-element-b70e5bb elementor-section-height-min-height elementor-section-items-top elementor-section-boxed elementor-section-height-default\" data-id=\"b70e5bb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\" elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-5bbc6ab\" data-fullscreen-column-settings=\"{&quot;fullscreen&quot;:&quot;&quot;}\" data-id=\"5bbc6ab\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5130585 elementor-widget__width-initial elementor-widget elementor-widget-litho-heading\" data-id=\"5130585\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"litho-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"litho-heading elementor-size-default\"><span class=\"litho-primary-title\">We develop open-source tools for cybersecurity verification.<\/span><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\" elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-dc8b65c elementor-hidden-tablet elementor-hidden-phone\" data-fullscreen-column-settings=\"{&quot;fullscreen&quot;:&quot;&quot;}\" data-id=\"dc8b65c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\" elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-f7b99f2\" data-fullscreen-column-settings=\"{&quot;fullscreen&quot;:&quot;&quot;}\" data-id=\"f7b99f2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4dcb79b elementor-widget elementor-widget-text-editor\" data-id=\"4dcb79b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We are a proud partner of the new European project Cybersecurity Certification and Assessment Tools (CCAT).<\/p><p>Led by the <strong>CRoCS<\/strong> research group from the Department of Computer Systems and Communications at <strong>Masaryk University\u2019s Faculty of Informatics<\/strong>, this three-year project aims to create practical, open-source tools for cybersecurity certification and assessment in compliance with new EU legislation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f27ba1c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f27ba1c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\" elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e77e24f\" data-fullscreen-column-settings=\"{&quot;fullscreen&quot;:&quot;&quot;}\" data-id=\"e77e24f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-280a828 elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-widget-mobile__width-initial elementor-widget elementor-widget-litho-heading\" data-id=\"280a828\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"litho-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"litho-heading elementor-size-default\"><span class=\"litho-primary-title\">All tools will be open-source and available to everyone, free of charge.<\/span><span class=\"litho-secondary-title\"><a href=\"https:\/\/monetplus.cz\/en\/contact\/#office\"><\/a><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7cd3c5f elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7cd3c5f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\" elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ded761e\" data-fullscreen-column-settings=\"{&quot;fullscreen&quot;:&quot;&quot;}\" data-id=\"ded761e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f8f1cb elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"1f8f1cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"7,0,0\">The project involves a strong European consortium consisting of leading academic institutions and technology companies specializing in cybersecurity:<\/p><p data-path-to-node=\"7,0,0\"><b data-path-to-node=\"7,0,0\" data-index-in-node=\"0\">Universities and Research Institutions:<br \/><\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Paderborn University (DE)<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Universit\u00e0 Ca\u2019 Foscari Venezia (IT)<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">University of Tartu (EST)<\/span><\/li><\/ul><p data-path-to-node=\"7,1,0\"><b data-path-to-node=\"7,1,0\" data-index-in-node=\"0\">Private Companies and Industrial Partners:<br \/><\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Monet+ (CZ)<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cybernetica AS (EST)<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">10Sec S.r.l. (IT)<\/span><\/li><\/ul><p data-path-to-node=\"7,2,0\"><b data-path-to-node=\"7,2,0\" data-index-in-node=\"0\"><span style=\"font-weight: 400;\"><strong>Associated Partners:<\/strong><br \/><\/span><\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Red Hat (CZ)<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Tropic Square (CZ)<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\" elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c30031d\" data-fullscreen-column-settings=\"{&quot;fullscreen&quot;:&quot;&quot;}\" data-id=\"c30031d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b7762fc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b7762fc\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\" elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b824457\" data-fullscreen-column-settings=\"{&quot;fullscreen&quot;:&quot;&quot;}\" data-id=\"b824457\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-084b59a elementor-widget elementor-widget-litho-heading\" data-id=\"084b59a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"litho-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"litho-heading elementor-size-default\"><span class=\"litho-primary-title\">Clear methodologies and tools for a secure future<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1193c9 elementor-widget__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"a1193c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-path-to-node=\"7,0,1\"><span class=\"citation-112\">The European <strong>Cybersecurity Act<\/strong> and <strong>Cyber Resilience Act<\/strong> are becoming increasingly demanding. Our mission within the project is to ensure that the resulting tools are practically applicable for companies, helping them meet these rigorous standards with ease.<\/span><\/span><\/p><p><span style=\"font-weight: 400;\">For Monet+, this collaboration represents another step toward building a trustworthy digital environment where security is not just a theoretical concept, but a measurable and certifiable parameter.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94e3e71 elementor-widget elementor-widget-litho-heading\" data-id=\"94e3e71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"litho-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"litho-heading elementor-size-default\"><span class=\"litho-primary-title\">Monet+\u2019s Role in CCAT<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cea3922 elementor-widget__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"cea3922\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As experts in applied cryptography and software security, we serve as the testing and validation partner in the CCAT project<span style=\"font-weight: 400;\">. Our role is to ensure that theoretical models and academic tools succeed in real-world commercial environments and during integration into critical infrastructure.<\/span><\/p><p>Our goal is to develop and test practical open-source tools that help companies and institutions effectively verify the security of products and services, while providing developers with clearer guidance on how to meet European cybersecurity requirements.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fef57f4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fef57f4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\" elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7ba082d\" data-fullscreen-column-settings=\"{&quot;fullscreen&quot;:&quot;&quot;}\" data-id=\"7ba082d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-86141f2 elementor-widget elementor-widget-litho-heading\" data-id=\"86141f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"litho-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"litho-heading elementor-size-default\"><span class=\"litho-primary-title\">Technological tools of CCAT<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29dce93 elementor-widget__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"29dce93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The project is built on the development and integration of four existing tools that are vital to the security of the digital ecosystem:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4e47b36 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4e47b36\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\" elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f65310c\" data-fullscreen-column-settings=\"{&quot;fullscreen&quot;:&quot;&quot;}\" data-id=\"f65310c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2e53c3b elementor-position-left elementor-view-stacked elementor-widget__width-initial elementor-shape-circle elementor-mobile-position-top elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-litho-icon-box\" data-id=\"2e53c3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"litho-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper litho-icon-box-wrapper\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\t\t\t\t\t<span class=\"elementor-icon elementor-animation-\" >\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<span class=\"screen-reader-text\">Icon<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-box-title\"><span ><b>TLS-Scanner<\/b>: A tool for assessing the security of TLS clients and servers to identify vulnerabilities and configurations issues.<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\" elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-52a7930\" data-fullscreen-column-settings=\"{&quot;fullscreen&quot;:&quot;&quot;}\" data-id=\"52a7930\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9ce8e34 elementor-position-left elementor-view-stacked elementor-widget__width-initial elementor-shape-circle elementor-mobile-position-top elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-litho-icon-box\" data-id=\"9ce8e34\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"litho-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper litho-icon-box-wrapper\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\t\t\t\t\t<span class=\"elementor-icon elementor-animation-\" >\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<span class=\"screen-reader-text\">Icon<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-box-title\"><span ><b>SCRUTINY: <\/b> A set of tools of evaluating cryptographic implementations in both hardware devices (e.g., smart cards) and software libraries.<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2f6ddb8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2f6ddb8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\" elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d998ca5\" data-fullscreen-column-settings=\"{&quot;fullscreen&quot;:&quot;&quot;}\" data-id=\"d998ca5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-886d3de elementor-position-left elementor-view-stacked elementor-widget__width-initial elementor-shape-circle elementor-mobile-position-top elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-litho-icon-box\" data-id=\"886d3de\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"litho-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper litho-icon-box-wrapper\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\t\t\t\t\t<span class=\"elementor-icon elementor-animation-\" >\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<span class=\"screen-reader-text\">Icon<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-box-title\"><span ><b>ALVIE<\/b>: A tool for analyzing the security architectures of embedded systems with respect to vulnerabilities, combining formal methods with vulnerability research.<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\" elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-799456a\" data-fullscreen-column-settings=\"{&quot;fullscreen&quot;:&quot;&quot;}\" data-id=\"799456a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2176469 elementor-position-left elementor-view-stacked elementor-widget__width-initial elementor-shape-circle elementor-mobile-position-top elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-litho-icon-box\" data-id=\"2176469\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"litho-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper litho-icon-box-wrapper\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\t\t\t\t\t<span class=\"elementor-icon elementor-animation-\" >\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<span class=\"screen-reader-text\">Icon<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-box-title\"><span ><b>sec-certs<\/b>: A platform for analyzing the environment of certified cybersecurity products, mapping the dependencies between certified products and newly emerging vulnerabilities.<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-408afd7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"408afd7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\" elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5805755\" data-fullscreen-column-settings=\"{&quot;fullscreen&quot;:&quot;&quot;}\" data-id=\"5805755\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a73fef5 elementor-widget__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"a73fef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The project is supported by the European Cybersecurity Competence Centre (ECCC) under Grant Agreement No. 101225878. <\/p><p>Funded by <a href=\"https:\/\/www.linkedin.com\/company\/cybersec-eccc\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">European Cybersecurity Competence Centre (ECCC).<\/span><\/span><\/a><\/p><p>The <a href=\"https:\/\/cordis.europa.eu\/project\/id\/101225878\" target=\"_blank\" rel=\"noopener\">Cybersecurity Certification and Assessment Tools (CCAT)<\/a> project is a Horizon Europe Innovation Action (HORIZON-IA, topic: HORIZON-CL3-2024-CS-01-01 \u2013 Approaches and tools for security in software and hardware development and assessment) with a total budget of \u20ac4,223,156.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0c0d2ae elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0c0d2ae\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\" elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c954daa\" data-fullscreen-column-settings=\"{&quot;fullscreen&quot;:&quot;&quot;}\" data-id=\"c954daa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-16cf915 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"16cf915\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"120\" src=\"https:\/\/monetplus.cz\/wp-content\/uploads\/2026\/02\/Funded-by-the-European-Union-300x120.png\" class=\"attachment-medium size-medium wp-image-107545\" alt=\"Funded-by-the-European-Union\" srcset=\"https:\/\/monetplus.cz\/wp-content\/uploads\/2026\/02\/Funded-by-the-European-Union-300x120.png 300w, https:\/\/monetplus.cz\/wp-content\/uploads\/2026\/02\/Funded-by-the-European-Union-1024x410.png 1024w, https:\/\/monetplus.cz\/wp-content\/uploads\/2026\/02\/Funded-by-the-European-Union-768x307.png 768w, https:\/\/monetplus.cz\/wp-content\/uploads\/2026\/02\/Funded-by-the-European-Union.png 1200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3bcccc elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"f3bcccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"106\" src=\"https:\/\/monetplus.cz\/wp-content\/uploads\/2026\/02\/ECCC_logo-300x106.png\" class=\"attachment-medium size-medium wp-image-107546\" alt=\"ECCC_logo\" srcset=\"https:\/\/monetplus.cz\/wp-content\/uploads\/2026\/02\/ECCC_logo-300x106.png 300w, https:\/\/monetplus.cz\/wp-content\/uploads\/2026\/02\/ECCC_logo.png 588w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CCAT: European Research Project We develop open-source tools for cybersecurity verification. We are a proud partner of the new European project Cybersecurity Certification and Assessment Tools (CCAT). Led by the CRoCS research group from the Department of Computer Systems and Communications at Masaryk University\u2019s Faculty of Informatics, this three-year project aims to create practical, open-source [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-107548","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/monetplus.cz\/en\/wp-json\/wp\/v2\/pages\/107548","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/monetplus.cz\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/monetplus.cz\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/monetplus.cz\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/monetplus.cz\/en\/wp-json\/wp\/v2\/comments?post=107548"}],"version-history":[{"count":19,"href":"https:\/\/monetplus.cz\/en\/wp-json\/wp\/v2\/pages\/107548\/revisions"}],"predecessor-version":[{"id":108380,"href":"https:\/\/monetplus.cz\/en\/wp-json\/wp\/v2\/pages\/107548\/revisions\/108380"}],"wp:attachment":[{"href":"https:\/\/monetplus.cz\/en\/wp-json\/wp\/v2\/media?parent=107548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}