Inhaltstyp
Kategorien
-
CIS Compliance Summit 2022
new approaches to dealing with cyber risks in the supply chain, as well as the world of management systems, standards and norms. They will also explain why it is more important than ever to think outside [...] Technology, will give a presentation on the topic of "Secure digital future through controllable digital systems". An abstract of the interview conducted in advance can be found here. Registration for the event
-
Vorarlberg IT specialists train in defence against cyber attacks on supply chains
supply network of four companies. This fictitious scenario resulted in the complete failure of the IT systems, ransom demands, media coverage that the company management could no longer keep track of and the [...] the complete loss of food supplies to the population. The aim of the exercise was to restore the systems to normal operation by the end of the exercise using emergency plans and communication strategies [...] interconnected via their supply chains, which also entails extensive branching of the necessary digital systems of the companies involved. Instead of attacking companies directly, criminals therefore use the more
-
IMAGINE21 - “Be the Change!“ digital technologies for people and environment
globally. In order to provide highly reliable communication for industrial control systems, robots, autonomous systems and much more in the course of the digitalisation of our society, further technical [...] the AIT Center for Digital Safety & Security, will present reliable wireless 6G communication systems. His presentation is about the mobile networking of people, but also of machines and physical objects
-
TARO
The rail system is facing major challenges: The climate crisis and sustainability goals call for a strong increase in rail capacity, which cannot be met exclusively by means of conventional technologies [...] Operations" therefore deals with the possibilities of using automation and digitalization in the railroad system to address the challenges. Jürgen Zajicek, Research Engineer at the Center for Energy, Markus Hofer
-
KSÖ, AIT AND IV organized BLACKOUT TRAINING FOR CRITICAL INFRASTRUCTURE SECTORS
define effective protective measures due to the increased dependence on a wide variety of digital systems spanning a wide variety of critical infrastructures. Now, in the context of the AIT Cyber Training [...] modern AIT Cyber Range Platform as well as through the use of state-of-the-art digital simulation systems, concrete effects can be simulated for the whole of Austria for the first time. This makes it possible
-
AVL and AIT cooperate in the field of automotive safety
standard require OEMs and their supply chain to implement and certify a Cyber Security Management System (CSMS). This includes proactive management of cyber threats and risks to protect vehicles and in [...] Scientist and Security by Design expert at AIT. "Networking and automation require trustworthy systems, one of the core requirements of new regulations and initiatives, such as UN R155 for vehicles as [...] company covers vehicle architectures and platform solutions including the impact of new propulsion systems and energy carriers. As a global technology provider, AVL’s offerings range from simulation, vir
-
Deutsche Telekom builds test environment for quantum technology
researchers have access to an extensive fiber optic network with IT infrastructure. All types of QKD systems can be tested on it and limitations can be sounded out. At present, their range is limited to around [...] 100 km, as no optical amplifiers can be used. The researchers are interested in how individual QKD systems can be interconnected to form a QKD network. The aim is to protect the management of communication
-
Fake Shop Detector wins Constantinus Award
With over 21,000 features, the system checks suspicious shops, identifies them with almost 100 per cent accuracy and warns users in real time using a traffic light system. The Fake Shop Detector promises
-
DIH West Forum „Cloud Manufacturing“
will be given on current developments in the control and optimization of distributed manufacturing systems and on the challenges of protecting sensitive production data and the IT security of the CM. In addition
-
Girls! TECH UP
to the topic of virtual power plants. The participants were able to find out how the electricity system works, what flexible generators and consumers are needed for and then try it out for themselves in
-
Digital Factory Vorarlberg: launch pad for digitalisation
than ever before: “By leveraging the AIT network, Vorarlberg can connect to the European innovation system, providing access to new technologies and global developments.” Stefan Fitz-Rankl, Managing Director [...] research The focus of research at the Digital Factory Vorarlberg lies in cloud-based production systems, data science and artificial intelligence, wireless technologies and cybersecurity. One concrete [...] concrete example is the setting up of a so-called cyber range for developing and verifying IT security systems for companies in Vorarlberg. The cyber-range can be used to simulate cyber-attacks on company networks
-
Modern solutions for Austria's security
particularly significant in the areas of cyber defense, digitalization, ABC defense and autonomous systems. "The use of the latest technologies is becoming increasingly important. In order to be able to evaluate [...] and industry also benefit from this cooperation," says Plimon. Plimon cites fake news detection systems and quantum technologies for eavesdropping security and data sovereignty, among other things, as
-
KSÖ, AIT and DAS HAUS DER DIGITALISIERUNG organised cyber security training for the Austrian economy
communication technology). For example, email clients, ERP systems and electronic banking applications as well as various software backup systems were infiltrated unnoticed with malware. Five teams fought [...] Erfahrungen bei der Verteidigung von Cyberangriffen kann eine wirksame Resilienz unserer digitalen Systeme erreicht werden. Dies nur durch eine enge Zusammenarbeit von Unternehmen, Wissenschaft und Behörden
-
CONFERENCE: DIGITAL SECURITY IN TIMES OF PANDEMIC
and economic systems. This also includes problems emerging as the result of sweeping digitalisation in all areas of life. One area particularly impacted is the security of our digital systems: digital c [...] Huemer-IT, Ikarus, Kuratorium Sicheres Österreich (KSÖ), SBA Research, Softprom Distribution, Sparx Systems Central Europe, T3K-Forensics, World Institute for Nuclear Security (WINS) and X-Net Services. The
-
International Conference on Computer Security in the Nuclear World: Security for Safety 2023
tools, as the vulnerability to the theft and/or manipulation of sensitive information and computer systems to cyber-attacks is widely recognized. Main Topics Consistent with the objectives, the overall
-
International conference: digital security calls for greater global cooperation
December – in digital format due to the coronavirus. Ensuring the security of our data and digital systems is a key prerequisite for realising the potential offered by digitalisation. All our digital inf [...] within a global context, including the omnipresent social media platforms, the video communications systems we currently use while working from home, the widely-used government agency networks and citizens' [...] field,” the expert said. Rafal Jaczynski, CSO at Huawei CEE & Nordics, confirmed that many IT systems are not well protected from cyber-attacks in practice. “Many companies are navigating the digitalisation
-
AIT APPOINTED AS THE FIRST "IAEA COLLABORATING CENTRE" IN THE FIELD OF CYBER SECURITY FOR NUCLEAR SAFETY
tools for the protection of digital systems, as well as the implementation of special training and education courses on computer security for industrial control systems. On 10 May at the AIT headquarters [...] Security". Based on the core cyber security competencies established at AIT in the area of control systems for critical infrastructures, AIT has thus been appointed the official security partner of the IAEA
-
Fake Shops, Real Solutions
reason that new approaches are needed for the testing and verification of AI systems, including guarantees that the AI systems behave strictly according to the defined specifications, and that they observe [...] and ethical rules for technology. Consequently, new areas of research such as the testing of AI systems are important starting points for AIT. Helmut Leopold is clear that AI should not be demonised: “Society
-
HIGH-TECH MADE IN AUSTRIA: CUTTING-EDGE DIGITALISATION SOLUTIONS PRESENTED AT EUROPE'S LARGEST IT SECURITY TRADE FAIR
es möglich, die gesamte System-Architektur sicherheitskritischer Anwendungen wie z.B. von vernetzten Fahrzeugen zu analysieren. Eine automatisierte Analyse auf potenzielle System-Risiken und Angriffspfade [...] ty-Management System vorzuweisen. ThreatGet steht Consulting Unternehmen im Rahmen eines Partnerprogramms für die Risiko-Management-Beratung für höchst sichere IT- und Elektronik-Systeme zur Verfügung [...] darauf aufbauenden Lösung Sec³ Secure Cloud Connecting System, dass zu keiner Zeit ein unkontrollierter Zugriff auf Daten möglich ist. Das System wurde von X-Net Technologies weiterentwickelt und bietet
-
Hybrid Event - Security Trends
AI all-überall – Übersicht über Standardisierungsaktivitäten für vertrauenswürdige, sichere KI-Systeme - mit Erwin Schoitsch (AIT Austrian Institute of Technology, Senior Research Fellow) Infos und