Inhaltstyp
Kategorien
-
IMAGINE21 - “Be the Change!“ digital technologies for people and environment
globally. In order to provide highly reliable communication for industrial control systems, robots, autonomous systems and much more in the course of the digitalisation of our society, further technical [...] the AIT Center for Digital Safety & Security, will present reliable wireless 6G communication systems. His presentation is about the mobile networking of people, but also of machines and physical objects
-
TARO
The rail system is facing major challenges: The climate crisis and sustainability goals call for a strong increase in rail capacity, which cannot be met exclusively by means of conventional technologies [...] Operations" therefore deals with the possibilities of using automation and digitalization in the railroad system to address the challenges. Jürgen Zajicek, Research Engineer at the Center for Energy, Markus Hofer
-
KSÖ, AIT AND IV organized BLACKOUT TRAINING FOR CRITICAL INFRASTRUCTURE SECTORS
define effective protective measures due to the increased dependence on a wide variety of digital systems spanning a wide variety of critical infrastructures. Now, in the context of the AIT Cyber Training [...] modern AIT Cyber Range Platform as well as through the use of state-of-the-art digital simulation systems, concrete effects can be simulated for the whole of Austria for the first time. This makes it possible
-
SEMANTiCS 2018
implementations, use case prototypes, best practices, panels, papers and posters to discuss semantic systems in a broad range of regular as well as informal settings. SEMANTiCS addresses problems common among [...] and various specialist departments working to develop, implement and evaluate semantic software systems. The SEMANTiCS program will provide a rich mix of technical talks, panel discussions on emerging
-
DIH West Forum „Cloud Manufacturing“
will be given on current developments in the control and optimization of distributed manufacturing systems and on the challenges of protecting sensitive production data and the IT security of the CM. In addition
-
Girls! TECH UP
to the topic of virtual power plants. The participants were able to find out how the electricity system works, what flexible generators and consumers are needed for and then try it out for themselves in
-
Digital Factory Vorarlberg: launch pad for digitalisation
than ever before: “By leveraging the AIT network, Vorarlberg can connect to the European innovation system, providing access to new technologies and global developments.” Stefan Fitz-Rankl, Managing Director [...] research The focus of research at the Digital Factory Vorarlberg lies in cloud-based production systems, data science and artificial intelligence, wireless technologies and cybersecurity. One concrete [...] concrete example is the setting up of a so-called cyber range for developing and verifying IT security systems for companies in Vorarlberg. The cyber-range can be used to simulate cyber-attacks on company networks
-
KSÖ, AIT and DAS HAUS DER DIGITALISIERUNG organised cyber security training for the Austrian economy
communication technology). For example, email clients, ERP systems and electronic banking applications as well as various software backup systems were infiltrated unnoticed with malware. Five teams fought [...] Erfahrungen bei der Verteidigung von Cyberangriffen kann eine wirksame Resilienz unserer digitalen Systeme erreicht werden. Dies nur durch eine enge Zusammenarbeit von Unternehmen, Wissenschaft und Behörden
-
CONFERENCE: DIGITAL SECURITY IN TIMES OF PANDEMIC
and economic systems. This also includes problems emerging as the result of sweeping digitalisation in all areas of life. One area particularly impacted is the security of our digital systems: digital c [...] Huemer-IT, Ikarus, Kuratorium Sicheres Österreich (KSÖ), SBA Research, Softprom Distribution, Sparx Systems Central Europe, T3K-Forensics, World Institute for Nuclear Security (WINS) and X-Net Services. The
-
Modern solutions for Austria's security
particularly significant in the areas of cyber defense, digitalization, ABC defense and autonomous systems. "The use of the latest technologies is becoming increasingly important. In order to be able to evaluate [...] and industry also benefit from this cooperation," says Plimon. Plimon cites fake news detection systems and quantum technologies for eavesdropping security and data sovereignty, among other things, as
-
International Conference on Computer Security in the Nuclear World: Security for Safety 2023
tools, as the vulnerability to the theft and/or manipulation of sensitive information and computer systems to cyber-attacks is widely recognized. Main Topics Consistent with the objectives, the overall
-
International conference: digital security calls for greater global cooperation
December – in digital format due to the coronavirus. Ensuring the security of our data and digital systems is a key prerequisite for realising the potential offered by digitalisation. All our digital inf [...] within a global context, including the omnipresent social media platforms, the video communications systems we currently use while working from home, the widely-used government agency networks and citizens' [...] field,” the expert said. Rafal Jaczynski, CSO at Huawei CEE & Nordics, confirmed that many IT systems are not well protected from cyber-attacks in practice. “Many companies are navigating the digitalisation
-
Vorarlberg companies train for cyber emergencies
hacker attacks or blackmail via ransomware are now among the biggest business risks. A failure of IT systems not only costs a lot of time, money, reputation and nerves, but can also lead to the production [...] cyber- and information-focused attacks are used to change websites, paralyze digital services and systems, steal or encrypt data, damage machines and bring the entire business to a standstill. Such a scenario
-
Fake Shops, Real Solutions
reason that new approaches are needed for the testing and verification of AI systems, including guarantees that the AI systems behave strictly according to the defined specifications, and that they observe [...] and ethical rules for technology. Consequently, new areas of research such as the testing of AI systems are important starting points for AIT. Helmut Leopold is clear that AI should not be demonised: “Society
-
HIGH-TECH MADE IN AUSTRIA: CUTTING-EDGE DIGITALISATION SOLUTIONS PRESENTED AT EUROPE'S LARGEST IT SECURITY TRADE FAIR
es möglich, die gesamte System-Architektur sicherheitskritischer Anwendungen wie z.B. von vernetzten Fahrzeugen zu analysieren. Eine automatisierte Analyse auf potenzielle System-Risiken und Angriffspfade [...] ty-Management System vorzuweisen. ThreatGet steht Consulting Unternehmen im Rahmen eines Partnerprogramms für die Risiko-Management-Beratung für höchst sichere IT- und Elektronik-Systeme zur Verfügung [...] darauf aufbauenden Lösung Sec³ Secure Cloud Connecting System, dass zu keiner Zeit ein unkontrollierter Zugriff auf Daten möglich ist. Das System wurde von X-Net Technologies weiterentwickelt und bietet
-
Hybrid Event - Security Trends
AI all-überall – Übersicht über Standardisierungsaktivitäten für vertrauenswürdige, sichere KI-Systeme - mit Erwin Schoitsch (AIT Austrian Institute of Technology, Senior Research Fellow) Infos und
-
Cutting-edge IT security solutions “made in Austria” presented on “it-sa” in Nuremberg
AI-based technologies for detecting cyberattacks on IT systems and model-based design and testing tools ensuring the security and safety of cyberphysical systems (CPS). AIT has also developed an internationally [...] Safety & Security is developing modern information and communication technologies (ICT) and systems in order to establish secure and reliable critical infrastructure. Along with cutting edge encryption
-
IMAGINE23
Competence Center Hagenberg), Rudolf Heer (Silicon Austria Labs GmbH, Head of Research Unit ELS, Sensor Systems; nanoNET-Austria), Florian Prawits, Marie-Christine Slater and Jasmin Lampert (Austrian Institute
-
AIT Fake Shop Detector nominated for Houska Prize 2023
measure the similarity of each web shop to known fake shops and warn of fraud using a traffic light system. The Fake Shop Detector thus makes a significant contribution to increasing security in online commerce
-
"Trust in Cloud" using agile encryption technologies
important role for your company? The increased complexity of our digital and globally interconnected systems requires concepts and tools that reduce the complexity of and demands on infrastructure operations