Visit Austria's most impactful tech-networking event
EBSCON 2024
Eine Befragung offenbart den Handlungsdruck: 69% müssen ihr Produktportfolio technisch überarbeiten. Einem Drittel fehlt das notwendige ...
(Bild: Christine Danloff) If quantum computers crack current encryptions in the future, vital wearables will be acutely endangered. A new ASIC design from MIT is now putting a stop to this: The extremely economical chip brings post-quantum cryptography directly into the implant and offers integrated hardware protection against power-side channel attacks and voltage glitching.
IBM unveils autonomous security to counter AI-driven cyberattacks
Taceo gilt als zurzeit begehrtestes steirisches Start-up. Gespickt mit Dollar-Millionen von Investoren à la Andreessen Horowitz, will man das Dilemma zwischen Datenschutz und der Nutzung sensibler Daten auflösen.
Zwei Ex-Soldaten bauen mit Armis ein Milliarden-Startup – und schützen damit die Geräte, die bisher niemand auf dem Schirm hatte.
The growing adoption of IoT and cloud computing, combined with rapid advancements in digital technologies, has considerably increased the cyber-attack surface, resulting in increasingly complex and persistent attacks. Traditional security methods, primarily based on perimeter defenses, are insufficient to meet these developing threats, especially within the context of a Zero Trust Security (ZTS) architecture. This study investigates the application of sophisticated artificial intelligence (AI) and machine learning (ML) techniques, including the use of the Synthetic Minority Oversampling Technique (SMOTE), to improve anomaly detection and threat intelligence systems. This study focuses on how Support Vector Machine (SVM), Random Forest (RF), and Decision Tree (DT) classifiers might increase threat detection accuracy in IoT environments. The research endeavors to improve cybersecurity resilience by mitigating false positives and providing actionable intelligence through supervised learning algorithms. The KDD Cup 1999 dataset is used in the study to assess how well these models perform in simulating various network intrusions and regular traffic. The application of SMOTE significantly enhanced the performance of these models by addressing class imbalance, leading to improved detection accuracy. Furthermore, as supplementary methods for detecting malicious URLs and advanced persistent threats (APTs), edge-based machine learning and blockchain technology are investigated. This study addresses the shortcomings of conventional security systems and supports the growing demand for reliable threat detection in a world that is becoming more interconnected. It also advances the creation of more proactive and adaptable cybersecur
The use of emerging technologies such as artificial intelligence is increasing cybersecurity risks in the healthcare sector.
Algorithmic advances are steadily lowering the bar for quantum attacks—even before large-scale hardware exists.
Ziel ist ein „Unternehmen von Weltrang“: Der steirische Cybersecurity-Spezialist Markus Seme versammelt ehemalige Führungskollegen um sich und gründet ein Start-up.
New Managed Detection and Response (MDR) service from Siemens enables enhanced 24/7 cybersecurity for critical infrastructures Siemens offers comprehensive and
/PRNewswire/ -- Cloud Next '26 -- Today Vodafone Business and Google Cloud announce an expansion of their strategic partnership with two new solutions to equip...
PentAGI is an open-source autonomous AI penetration testing framework using multi-agent AI to execute security assessments in Docker.
The emergence of quantum computing challenges traditional security mechanisms, particularly in heterogeneous and resource-constrained IoT and smart environments that must satisfy DN25 requirements. This work introduces a reinforcement learning-driven model for the adaptive selection and orchestration of cryptographic algorithms. Acting as an intelligent decision layer, the system observes contextual, network, and operational metrics to recommend or enforce configurations combining classical schemes, post-quantum cryptography, and Quantum Key Distribution when available. The selection problem is formulated as a Markov Decision Process with state and action spaces aligned with protocol control flows and is embedded into a security middleware with negotiation and fallback mechanisms to ensure interoperability and policy compliance without modifying application logic. Experimental results demonstrate that the model dynamically adjusts key lengths, algorithm families, and security policies according to risk and resource conditions, increasing post-quantum cryptography and Quantum Key Distribution usage by up to 33.4% and 23.9% in high-risk scenarios while favoring low-latency classical or hybrid options for less critical traffic. The system achieves success rates above 78% while maintaining stable latency and resource usage during extended operation.
Der NTT DATA Audit Automator orientiert sich am IT-Grundschutz des BSI und liefert KI-gestützt hochwertige Echtzeit-Informationen für einen präzisen Konformitätsnachweis.
Circuit design is not only relevant for electrical engineering. It can also be applied to interdisciplinary projects that require electrical input, output, or control, such as robotics, biomedical devices, renewable energy, and smart systems. Through interdisciplinary projects, the designer must understand the project goals and requirements, as well as the roles of other team members. Therefore, communication with collaborators is essential, as is the use of common standards and tools to ensure compatibility. In the framework of this CASS Seasonal School call, a 2-day school on “Interdisciplinary Applications of Circuits and Systems” was organized during October 16-17, in the Conference and Cultural Center of the University of Patras, Greece. At this educational event, basic and advanced issues on design methodologies targeting on interdisciplinary applications were presented, including the following: circuits and systems in biology/biomedicine, in agriculture, in cryptography, in control systems, in chaos, in RF applications, in Internet of Things (IoT) systems, in quantum computing, as well as the employment of artificial intelligence and machine learning techniques for designing circuits. In this book the following are introduced: • Chaotic oscillators and their real-world applications, the basic principles of the PID controllers followed by application design examples • Applications of circuits in agriculture, the employment of artificial intelligence (AI) and machine learning (ML) techniques for design • The design challenges and innovative solutions for energy harvesting for wearable and implantable devices • Medical and health applications of biosensing circuits and systems • Cryptographic hardware and embedded systems • Computer vision and deep learning techniques for electronic circuit inspection • Cryo-CMOS integrated circuits for scalable quantum computing • Energy-efficient analog circuits and systems for emerging RF applications.
Accenture and Anthropic launch their new AI-powered cybersecurity solution, Cyber.AI.
Singaporean authorities are urging businesses to harden cybersecurity defenses following the preview of Anthropic's "Mythos" AI model. The model's advanced
Artificial intelligence has triggered a paradigm shift, within which CERT-EU's new Cyber Threat Intelligence Framework takes on a particularly important role. Here's how it allows you to classify, evaluate, and prioritize malicious cyber activities.
(Bild: Maks Lab - stock.adobe.com) Arrow Electronics und NXP Semiconductors unterstützen Kunden zur Vorbereitung auf die CRA-Compliance. Sie kombinieren NXP-Sicherheitstechnologie mit eInfochips-Entwicklungskompetenzen. Der Prozess umfasst Risikoanalyse, Secure-by-Design-Hardware und sichere Bereitstellung in Arrow's Lager.
Ziel der Entwicklung ist ein offenes Chip-Design, das quantenresistente Kryptographie nativ unterstützt und auf Open-Source-Technologien basiert.
Die Einführung von GPT-5.4-Cyber markiert einen Wendepunkt im digitalen Wettrüsten. Unternehmen setzen verstärkt auf KI-gestützte Abwehrmechanismen gegen zunehmende IT-Bedrohungen.
The security of data communication in Smart Grids (SGs) is traditionally reliant on cryptosystems based on the computational difficulty of certain mathematical problems. However, the advent of quantum computers, with their unparalleled computational power, threatens the robustness of classical cryptographic methods. Despite significant research into quantum-secure solutions, limited attention has been given to quantum-based security in SGs. To address these emerging security challenges, this paper proposes a quantum-based multifaceted secure communication model (Qu-MCM) for SGs, offering unconditional security by leveraging quantum mechanical principles. The key contributions include: quantum encryption of power consumption data using truly random keys, a quantum-secure key exchange protocol between power users and utility suppliers, and data authentication and integrity verification through quantum fingerprinting. The model is experimentally evaluated via simulations on classical computer and actual quantum hardware using the IBM Qiskit platform. The experimental results show that the encryption algorithm achieves an accuracy of 81.73%, while the authentication algorithm reaches 87.4% through a probability distribution graph where accuracy signifies the dominance of correct outputs. The results demonstrate the validity of the proposed model, with a comprehensive security analysis confirming its perfect security, where perfect security is defined as the maximally mixed states achieved after encryption that is impossible to break for an eavesdropper equipped with quantum resources. Note to Practitioners—The advent of quantum computing poses a significant challenge to the security of smart grid communications, rendering traditional cryptographic methods increasingly vulnerable. This work introduces the Quantum-based Multifaceted Secure Communication Model (Qu-MCM), a practical framework designed to provide unconditional security for SGs using quantum mechanical principles. Qu-MCM integrates quantum encryption with truly random keys, a quantum-secure key exchange protocol, and data authentication via quantum fingerprinting to safeguard power consumption data and communication channels. Evaluations conducted on classical and quantum hardware via the IBM Qiskit platform demonstrate its effectiveness, achieving high encryption and authentication accuracy rates. This model provides multiple benefits to stakeholders and practitioners, including future-proofing SGs against conventional and quantum-era security threats as well, ensuring the confidentiality, integrity, and authenticity of critical data, and maintaining trust in utility operations. By addressing emerging security challenges, Qu-MCM empowers stakeholders to enhance grid reliability, comply with evolving security regulations, and protect consumer privacy in increasingly interconnected energy systems.
(Bild: phive2015 - stock.adobe.com) Am 14. April ist World Quantum Day: Quantencomputing bringt Chancen, aber „Harvest now, decrypt later“ erhöht Cybersicherheitsrisiken.
ConSense Softwarelösungen erleichtern Aufbau und Steuerung eines ISMS