Inhaltstyp
Kategorien
-
TARO
The rail system is facing major challenges: The climate crisis and sustainability goals call for a strong increase in rail capacity, which cannot be met exclusively by means of conventional technologies [...] Operations" therefore deals with the possibilities of using automation and digitalization in the railroad system to address the challenges. Jürgen Zajicek, Research Engineer at the Center for Energy, Markus Hofer
-
Girls! TECH UP
to the topic of virtual power plants. The participants were able to find out how the electricity system works, what flexible generators and consumers are needed for and then try it out for themselves in
-
This was the Vorarlberg Technology Exchange
comprehensive digitization and global networking of systems. At the technology exchange, the competences on cyber security for industrial control systems, as well as state-of-the-art cryptography methods [...] methods, highly secure and highly available software and systems were presented, new cooperation opportunities were discussed and more intensive networking in technology research was discussed.
-
Digital Factory Vorarlberg: launch pad for digitalisation
than ever before: “By leveraging the AIT network, Vorarlberg can connect to the European innovation system, providing access to new technologies and global developments.” Stefan Fitz-Rankl, Managing Director [...] research The focus of research at the Digital Factory Vorarlberg lies in cloud-based production systems, data science and artificial intelligence, wireless technologies and cybersecurity. One concrete [...] concrete example is the setting up of a so-called cyber range for developing and verifying IT security systems for companies in Vorarlberg. The cyber-range can be used to simulate cyber-attacks on company networks
-
Phoenix Contact OT Security Kick-Off
safety-critical / fault-tolerant system architectures, is an expert in international standardization groups such as TC65/AHG2 "Reliability of Automation Devices and Systems" as well as project leader for [...] a series of lectures in the auditorium of the TU Wien Science Center in the Arsenal. All digital systems, i.e. products "with digital elements" such as hardware and software, must follow a cyber security [...] ThreatGet, AIT has developed a new approach that identifies risks and attack paths on the basis of a system model, a threat database and potential attackers. This makes threats assessable, security goals plannable
-
LIEBER.GROUP: INNOVATIVE CYBER SECURITY SOLUTION CONQUERS THE CONSULTING INDUSTRY
modern cyber security management system that addresses the automotive industry, among others. The cooperation with the Lieber.Group as a specialist for model-based system development and internationally [...] y, but introduces the process model as early as the system development stage. In this way, new target groups - people from the enterprise or system architecture and those responsible for quality - are [...] development process, it is possible to accompany companies holistically in the analysis of insecure system architectures. At the same time, this also increases the quality of consulting." With ThreatGet
-
CONFERENCE: DIGITAL SECURITY IN TIMES OF PANDEMIC
and economic systems. This also includes problems emerging as the result of sweeping digitalisation in all areas of life. One area particularly impacted is the security of our digital systems: digital c [...] Huemer-IT, Ikarus, Kuratorium Sicheres Österreich (KSÖ), SBA Research, Softprom Distribution, Sparx Systems Central Europe, T3K-Forensics, World Institute for Nuclear Security (WINS) and X-Net Services. The
-
Vorarlberg companies train for cyber emergencies
hacker attacks or blackmail via ransomware are now among the biggest business risks. A failure of IT systems not only costs a lot of time, money, reputation and nerves, but can also lead to the production [...] cyber- and information-focused attacks are used to change websites, paralyze digital services and systems, steal or encrypt data, damage machines and bring the entire business to a standstill. Such a scenario
-
Safety Operation Center Workshop at the Digital Factory Vorarlberg
essential component of enterprise cybersecurity, a SOC ensures the integrity of corporate networks, systems and data. SOCs play an important role in identifying and responding to security incidents and threats
-
International conference: digital security calls for greater global cooperation
December – in digital format due to the coronavirus. Ensuring the security of our data and digital systems is a key prerequisite for realising the potential offered by digitalisation. All our digital inf [...] within a global context, including the omnipresent social media platforms, the video communications systems we currently use while working from home, the widely-used government agency networks and citizens' [...] field,” the expert said. Rafal Jaczynski, CSO at Huawei CEE & Nordics, confirmed that many IT systems are not well protected from cyber-attacks in practice. “Many companies are navigating the digitalisation
-
Helmut Leopold as board of directors’ candidate
IT services with significant market impact. He has always been actively engaged in developing eco-systems fostering innovation in new technology and market areas bringing together different stakeholders
-
Invited Talk on Hybrid Quantum-Safe Cryptography at NXP Belgium
invited talk for NXP Belgium about their work on hybrid cryptographic systems. Cryptography is omnipresent in our lives, and digital systems use it to securely communicate with each other. However, some of [...] that comes with the development of large-scale quantum computers. Migrations towards quantum-secure systems should start as soon as possible and hybridization is a versatile tool to achieve such a transit
-
Cloud ecosystems as the basis for tomorrow's EU economy
also illustrate future-oriented approaches for data exchange and data processing in distributed systems in order to develop new approaches and innovative business models for the cycling economy, product
-
Fake Shop Detector wins Constantinus Award
With over 21,000 features, the system checks suspicious shops, identifies them with almost 100 per cent accuracy and warns users in real time using a traffic light system. The Fake Shop Detector promises
-
Honorary doctorate awarded to Erwin Schoitsch
demonstrated a tireless dedication to improving software processes and developing safety-related systems that we can all rely on. His tireless work has not only laid the foundations for innovative technologies [...] technologies, but has also contributed significantly to the safety and reliability of embedded systems, which are of crucial importance in numerous areas of life. The vision and mission of MDU (Mälardalen
-
HIGH-TECH MADE IN AUSTRIA: CUTTING-EDGE DIGITALISATION SOLUTIONS PRESENTED AT EUROPE'S LARGEST IT SECURITY TRADE FAIR
es möglich, die gesamte System-Architektur sicherheitskritischer Anwendungen wie z.B. von vernetzten Fahrzeugen zu analysieren. Eine automatisierte Analyse auf potenzielle System-Risiken und Angriffspfade [...] ty-Management System vorzuweisen. ThreatGet steht Consulting Unternehmen im Rahmen eines Partnerprogramms für die Risiko-Management-Beratung für höchst sichere IT- und Elektronik-Systeme zur Verfügung [...] darauf aufbauenden Lösung Sec³ Secure Cloud Connecting System, dass zu keiner Zeit ein unkontrollierter Zugriff auf Daten möglich ist. Das System wurde von X-Net Technologies weiterentwickelt und bietet
-
HIGH-TECH MADE IN AUSTRIA: LATEST DIGITALIZATION SOLUTIONS PRESENTED AT EUROPE'S LARGEST ITS SECURITY CONFERENCE
the first time to analyze the entire system architecture of security-critical applications such as connected vehicles. Automated analysis for potential system risks and attack paths can be easily [...] security management system in place. ThreatGet is available to consulting companies through a partner program for risk management consulting for highly secure IT and electronics systems. ThreatGet was developed [...] and, with the Sec³ Secure Cloud Connecting System solution based on it, takes into account that no uncontrolled access to data is possible at any time. The system was further developed by X-Net Technologies
-
HIGH-TECH MADE IN AUSTRIA: LATEST DIGITALIZATION SOLUTIONS PRESENTED AT EUROPE'S LARGEST ITS SECURITY CONFERENCE
fakeshop.at ThreatGet: Ein KI-basiertes Cyber Security Management System, mit dem es erstmals möglich ist, die gesamte System-Architektur sicherheitskritischer Anwendungen wie z.B. von vernetzten [...] IT- und Elektronik-Systeme zur Verfügung. Entwickelt wurde ThreatGet von AIT gemeinsam mit Sparx Services CE, einer Geschäftseinheit der Lieber.Group. Secure Cloud Connecting System (SEC3): Eine revolutionäre [...] sicherstellt, dass zu keiner Zeit ein unkontrollierter Zugriff auf Daten über vernetzte Systeme möglich ist. Das System wurde von X-Net Technologies gemeinsam mit der Lisec Holding GmbH als industrieller
-
Vorarlberg IT specialists train in defence against cyber attacks on supply chains
supply network of four companies. This fictitious scenario resulted in the complete failure of the IT systems, ransom demands, media coverage that the company management could no longer keep track of and the [...] the complete loss of food supplies to the population. The aim of the exercise was to restore the systems to normal operation by the end of the exercise using emergency plans and communication strategies [...] interconnected via their supply chains, which also entails extensive branching of the necessary digital systems of the companies involved. Instead of attacking companies directly, criminals therefore use the more
-
KSÖ, AIT and DAS HAUS DER DIGITALISIERUNG organised cyber security training for the Austrian economy
communication technology). For example, email clients, ERP systems and electronic banking applications as well as various software backup systems were infiltrated unnoticed with malware. Five teams fought [...] Erfahrungen bei der Verteidigung von Cyberangriffen kann eine wirksame Resilienz unserer digitalen Systeme erreicht werden. Dies nur durch eine enge Zusammenarbeit von Unternehmen, Wissenschaft und Behörden