Inhaltstyp
Kategorien
-
STATE AWARD NOMINATION FOR AIT CYBER SECURITY SOLUTION "THREATGET"
highly secure digital systems. It supports developers of digital systems in avoiding threats - supported by Artificial Intelligence (AI) - through smart development approaches in system design. The special [...] solutions. Sparx Systems CE supports its partners in selling the system on the market through a wide range of activities. Using practical examples, ThreatGet was presented by AIT, Sparx Systems CE and msg Plaut [...] management system ThreatGet was awarded among the six nominees for the Austrian State Award Consulting 2022 in the category "Management Consulting and IT" out of about 200 submitted projects. The system and the
-
Trusting artificial intelligence is a double-edged sword
in their own systems and in systems they are competing, and to develop attack strategies to take down opponents. Finally we see a lot of products on the market that are using AI for system resilience. [...] ways. I am focusing on three aspects: systems robustness, response and resilience. In terms of robustness AI can be used to identify bugs and open doors in systems. It can get certain jobs like verification [...] already deployed to some extent to support systems responses to counter attacks. In 2016 at Cyber Grand Challenge organized by DARPA we have learned that AI systems can be played one against the other – to
-
Security by Design: New "THREATGET" tool tests cyber security in vehicles and systems
certified Cybersecurity Management System and Software Update Management System. The management systems used by OEMs must meet this regulation, and test vehicles and their systems/components for their ability [...] n technologies to ensure that our systems are highly secure and reliable in the context of comprehensive digitalisation and global networking. The Dependable Systems Engineering (DSE) group focuses on [...] Software, enables UNECE and ISO/SAE-21434-compliant verification of the cybersecurity of vehicle systems. Teamwork enhances cybersecurity in the automotive sector msg Plaut, a company with extensive expertise
-
Phoenix Contact OT Security Kick-Off
safety-critical / fault-tolerant system architectures, is an expert in international standardization groups such as TC65/AHG2 "Reliability of Automation Devices and Systems" as well as project leader for [...] a series of lectures in the auditorium of the TU Wien Science Center in the Arsenal. All digital systems, i.e. products "with digital elements" such as hardware and software, must follow a cyber security [...] ThreatGet, AIT has developed a new approach that identifies risks and attack paths on the basis of a system model, a threat database and potential attackers. This makes threats assessable, security goals plannable
-
AIT scientist receives prestigious Test of Time Award
monitoring and analysis of the runtime behaviour of software and hardware systems. Runtime verification techniques are crucial for system correctness, reliability, and robustness - and in the context of today's [...] Identification of Temporal Properties” Dejan Nickovic, AIT expert for safety of cyber-physical systems (CPS), received the Runtime Verification (RV) Test of Time Award 2021. Runtime verification is concerned
-
This was the Vorarlberg Technology Exchange
comprehensive digitization and global networking of systems. At the technology exchange, the competences on cyber security for industrial control systems, as well as state-of-the-art cryptography methods [...] methods, highly secure and highly available software and systems were presented, new cooperation opportunities were discussed and more intensive networking in technology research was discussed.
-
HIGH-TECH MADE IN AUSTRIA: LATEST DIGITALIZATION SOLUTIONS PRESENTED AT EUROPE'S LARGEST ITS SECURITY CONFERENCE
fakeshop.at ThreatGet: Ein KI-basiertes Cyber Security Management System, mit dem es erstmals möglich ist, die gesamte System-Architektur sicherheitskritischer Anwendungen wie z.B. von vernetzten [...] IT- und Elektronik-Systeme zur Verfügung. Entwickelt wurde ThreatGet von AIT gemeinsam mit Sparx Services CE, einer Geschäftseinheit der Lieber.Group. Secure Cloud Connecting System (SEC3): Eine revolutionäre [...] sicherstellt, dass zu keiner Zeit ein unkontrollierter Zugriff auf Daten über vernetzte Systeme möglich ist. Das System wurde von X-Net Technologies gemeinsam mit der Lisec Holding GmbH als industrieller
-
HIGH-TECH MADE IN AUSTRIA: LATEST DIGITALIZATION SOLUTIONS PRESENTED AT EUROPE'S LARGEST ITS SECURITY CONFERENCE
the first time to analyze the entire system architecture of security-critical applications such as connected vehicles. Automated analysis for potential system risks and attack paths can be easily [...] security management system in place. ThreatGet is available to consulting companies through a partner program for risk management consulting for highly secure IT and electronics systems. ThreatGet was developed [...] and, with the Sec³ Secure Cloud Connecting System solution based on it, takes into account that no uncontrolled access to data is possible at any time. The system was further developed by X-Net Technologies
-
LIEBER.GROUP: INNOVATIVE CYBER SECURITY SOLUTION CONQUERS THE CONSULTING INDUSTRY
modern cyber security management system that addresses the automotive industry, among others. The cooperation with the Lieber.Group as a specialist for model-based system development and internationally [...] y, but introduces the process model as early as the system development stage. In this way, new target groups - people from the enterprise or system architecture and those responsible for quality - are [...] development process, it is possible to accompany companies holistically in the analysis of insecure system architectures. At the same time, this also increases the quality of consulting." With ThreatGet
-
Invited Talk on Hybrid Quantum-Safe Cryptography at NXP Belgium
invited talk for NXP Belgium about their work on hybrid cryptographic systems. Cryptography is omnipresent in our lives, and digital systems use it to securely communicate with each other. However, some of [...] that comes with the development of large-scale quantum computers. Migrations towards quantum-secure systems should start as soon as possible and hybridization is a versatile tool to achieve such a transit
-
AIT AND ERICSSON AUSTRIA START COOPERATION IN THE FIELD OF THE MOST MODERN RADIO COMMUNICATION SYSTEMS
new radio technologies for highly secure, reliable and energy-efficient radio-based communication systems - for the most modern industrial applications, new mobility concepts and efficient public transport [...] ideal cooperation partner to jointly research technology topics at the transition from today's radio systems via 5G to the networks of the future and to develop an international leadership role. Ericsson Austria [...] research, pursues the following four central pillars in its research strategy. Trustworthiness of the systems, sustainability through the efficiency of the technology, accelerated automation and digitization
-
Best Position Paper Award at the "ICT for Ageing Well & e-Health" Conference
Security wanted to tackle this problem and were able to develop a new system in the FreeWalker project. While current "geofencing" systems severely restrict the freedom of the user due to rigid zones, this
-
Honorary doctorate awarded to Erwin Schoitsch
demonstrated a tireless dedication to improving software processes and developing safety-related systems that we can all rely on. His tireless work has not only laid the foundations for innovative technologies [...] technologies, but has also contributed significantly to the safety and reliability of embedded systems, which are of crucial importance in numerous areas of life. The vision and mission of MDU (Mälardalen
-
CIS Compliance Summit 2022
new approaches to dealing with cyber risks in the supply chain, as well as the world of management systems, standards and norms. They will also explain why it is more important than ever to think outside [...] Technology, will give a presentation on the topic of "Secure digital future through controllable digital systems". An abstract of the interview conducted in advance can be found here. Registration for the event
-
Vorarlberg IT specialists train in defence against cyber attacks on supply chains
supply network of four companies. This fictitious scenario resulted in the complete failure of the IT systems, ransom demands, media coverage that the company management could no longer keep track of and the [...] the complete loss of food supplies to the population. The aim of the exercise was to restore the systems to normal operation by the end of the exercise using emergency plans and communication strategies [...] interconnected via their supply chains, which also entails extensive branching of the necessary digital systems of the companies involved. Instead of attacking companies directly, criminals therefore use the more
-
IMAGINE21 - “Be the Change!“ digital technologies for people and environment
globally. In order to provide highly reliable communication for industrial control systems, robots, autonomous systems and much more in the course of the digitalisation of our society, further technical [...] the AIT Center for Digital Safety & Security, will present reliable wireless 6G communication systems. His presentation is about the mobile networking of people, but also of machines and physical objects
-
TARO
The rail system is facing major challenges: The climate crisis and sustainability goals call for a strong increase in rail capacity, which cannot be met exclusively by means of conventional technologies [...] Operations" therefore deals with the possibilities of using automation and digitalization in the railroad system to address the challenges. Jürgen Zajicek, Research Engineer at the Center for Energy, Markus Hofer
-
AVL and AIT cooperate in the field of automotive safety
standard require OEMs and their supply chain to implement and certify a Cyber Security Management System (CSMS). This includes proactive management of cyber threats and risks to protect vehicles and in [...] Scientist and Security by Design expert at AIT. "Networking and automation require trustworthy systems, one of the core requirements of new regulations and initiatives, such as UN R155 for vehicles as [...] company covers vehicle architectures and platform solutions including the impact of new propulsion systems and energy carriers. As a global technology provider, AVL’s offerings range from simulation, vir
-
Fake Shop Detector wins Constantinus Award
With over 21,000 features, the system checks suspicious shops, identifies them with almost 100 per cent accuracy and warns users in real time using a traffic light system. The Fake Shop Detector promises
-
DIH West Forum „Cloud Manufacturing“
will be given on current developments in the control and optimization of distributed manufacturing systems and on the challenges of protecting sensitive production data and the IT security of the CM. In addition