Skip to main content
All Posts By

Anna Marton, Safepay Systems

Professor Erol Gelenbe was Invited Panelist at the INFOCOM2025 News

Professor Erol Gelenbe was Invited Panelist at the INFOCOM2025

We are proud to share that on 20 May, 2025, Professor Erol Gelenbe served as an Invited Panelist on the topic "Towards 6G" at the prestigious INFOCOM 2025 Conference, one of the world’s leading forums in computer and telecommunications research. Professor Gelenbe addressed key cybersecurity challenges, including risks in supply…
UK “Call for Views on the Cyber Security of Enterprise Connected Devices” News

UK “Call for Views on the Cyber Security of Enterprise Connected Devices”

The UK government is evaluating legislation to enhance cybersecurity for enterprise IoT devices, as it did for consumer devices via its Product Security and Telecommunications Infrastructure (PSTI) Act. This move follows concerns over the vulnerability of industrial and business-critical IoT systems, which are increasingly targeted in cyberattacks. The UK government  announced…
Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. 2025. Transfer Learning for Software Vulnerability Prediction using Transformer Models. Journal of Systems and Software 2025. Publications

Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. 2025. Transfer Learning for Software Vulnerability Prediction using Transformer Models. Journal of Systems and Software 2025.

Journal: Journal of Systems and Software, Volume 227, September 2025, 112448 Authors: Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. Abstract: Recently software security community has exploited text mining and deep learning methods to identify vulnerabilities. To this end, the progress in the field of Natural Language Processing (NLP)…
Digital Transformation of Security Standards: Requirements Extraction using LLMs Insights

Digital Transformation of Security Standards: Requirements Extraction using LLMs

By Miltiadis Siavvas,  Information Technologies Institute (ITI) of the Centre for Research and Technology-Hellas (CERTH) In this insight post, we present the approach CERTH proposes for enabling the automation of the identification and extraction of security requirements from security standards with Large Language Models (LLMs). Compliance with international security standards…
ECSO Webinar: „Actions Beyond Words: Automating Audits for Streamlined Cybersecurity Compliance in Europe” News

ECSO Webinar: „Actions Beyond Words: Automating Audits for Streamlined Cybersecurity Compliance in Europe”

ECSO organized a webinar with NIST, on how OSCAL can be applied to an information system for documenting and assessing its security controls and transition from a text-based and manual approach (using word processors or spreadsheets) to a set of standardised, machine-readable formats. Our colleagues Prof. Antonio Skarmeta and Sara…
Panel on “Cybersecurity certification for the Computing Continuum” at the CLOSER 2025 Conference News

Panel on “Cybersecurity certification for the Computing Continuum” at the CLOSER 2025 Conference

Our colleague Prof. Antonio Skarmeta, University of Murcia, represented the DOSS project at the panel “Cybersecurity certification for the Computing Continuum: Future Challenges and opportunities”, organized within the framework of the European Cluster for Cybersecurity Certification. The panel took place during the 15th International Conference on Cloud Computing and Service Science…