Skip to main content
All Posts By

Anna Marton, Safepay Systems

Enterprise cyber resilience preparedness – PwC 2025 Global Digital Trust Insights News

Enterprise cyber resilience preparedness – PwC 2025 Global Digital Trust Insights

Cybersecurity is a core business enterprise risk. The attack surface continuously expands as AI, connected devices and cloud technologies become more and more prevalent. Still, as PwC’s 2025 Global Digital Trust Insights shows, only 2% of enterprises have implemented cyber resilience actions across their organisation in all areas surveyed; under…
Keynote by Professor Erol Gelenbe at the 7th IFIP IoT Conference News

Keynote by Professor Erol Gelenbe at the 7th IFIP IoT Conference

Professor Erol Gelenbe, Institute of Theoretical and Applied Informatics, Polish Academy of Sciences (IITIS-PAN) presented the Keynote titled “Deep Learning Based Cyberattack & Vulnerability Detection & Mitigation for the IoT”at the 7th IFIP IoT Conference in Nice, FR, 6-8 November 2024. In his keynote, Professor Gelenbe presented his results based…
ECCO knowledge-sharing webinar on strengthening trusted supply chains News

ECCO knowledge-sharing webinar on strengthening trusted supply chains

The European Cyber Security COmmunity Project (ECCO), in support of the ECCC, announces a new knowledge-sharing webinar focused on strengthening trusted supply chains, taking place on 15 November 2024 at 10:30 - 11:30 CEST. During the webinar you can listen to our colleague, Professor Erol Gelenbe, IITIS-PAN talk about real-time attack detection and…
Zhou G, Liu Y, Yan Z, Gelenbe E. 2024. Is ChatGPT Trustworthy Enough? A Review. IEEE Consumer Electronics Magazine 2024. Publications

Zhou G, Liu Y, Yan Z, Gelenbe E. 2024. Is ChatGPT Trustworthy Enough? A Review. IEEE Consumer Electronics Magazine 2024.

Journal: IEEE Consumer Electronics Magazine, vol. 13, 2024 Authors: Zhou G, Liu Y, Yan Z, Gelenbe E. Abstract: ChatGPT, as an advanced model that seamlessly integrates into diverse digital interactions, shows great potential to enhance the performance of consumer technology and reshape its landscape. The critical question of its trustworthiness…
Siavvas M, Xanthopoulou G, Kalouptsoglou I, Kehagias D, Tzovaras D. 2024. Digital Transformation of Security Standards: Requirements Extraction using Large Language Models. DSA 2024. Publications

Siavvas M, Xanthopoulou G, Kalouptsoglou I, Kehagias D, Tzovaras D. 2024. Digital Transformation of Security Standards: Requirements Extraction using Large Language Models. DSA 2024.

Conference: 11th International Conference on Dependable Systems and Their Applications (DSA2024), 2-3. November 2024, Taicang, Suzhou, China Authors: Siavvas M, Xanthopoulou G, Kalouptsoglou I, Kehagias D, Tzovaras D. Abstract: Compliance with international security standards is essential for ensuring the security of information systems, and thereby their dependability and trustworthiness. Compliance…
Barakat R, Josten S, Schneider M. 2024. Buffer Access Monitoring for Enhanced Buffer Overflow Detection in Fuzzing. EuroCyberSec 2024. Publications

Barakat R, Josten S, Schneider M. 2024. Buffer Access Monitoring for Enhanced Buffer Overflow Detection in Fuzzing. EuroCyberSec 2024.

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Barakat R, Josten S, Schneider M. Abstract: Buffer overflows remain one of the most critical and widespread vulnerabilities in software systems. Traditional fuzzing techniques often lack the precision required to reliably detect buffer overflows. This paper presents BUFFERMONITOR, a novel approach…