Skip to main content
All Posts By

Anna Marton, Safepay Systems

The program of the LIFESEC2025 Workshop has been published! News

The program of the LIFESEC2025 Workshop has been published!

The Workshop on Whole-Lifecycle Security for Smart Systems: Methods and Tools (LIFESEC2025) will take place on 16. June 2025, in Cork, Ireland, co-located with the 11th International Conference on Smart Computing (SMARTCOMP2025). Organized by the Horizon Europe projects DOSS and TELEMETRY, the workshop will dive into cutting-edge methodologies for ensuring secure…
Professor Erol Gelenbe was Invited Panelist at the INFOCOM2025 News

Professor Erol Gelenbe was Invited Panelist at the INFOCOM2025

We are proud to share that on 20 May, 2025, Professor Erol Gelenbe served as an Invited Panelist on the topic "Towards 6G" at the prestigious INFOCOM 2025 Conference, one of the world’s leading forums in computer and telecommunications research. Professor Gelenbe addressed key cybersecurity challenges, including risks in supply…
UK “Call for Views on the Cyber Security of Enterprise Connected Devices” News

UK “Call for Views on the Cyber Security of Enterprise Connected Devices”

The UK government is evaluating legislation to enhance cybersecurity for enterprise IoT devices, as it did for consumer devices via its Product Security and Telecommunications Infrastructure (PSTI) Act. This move follows concerns over the vulnerability of industrial and business-critical IoT systems, which are increasingly targeted in cyberattacks. The UK government  announced…
Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. 2025. Transfer Learning for Software Vulnerability Prediction using Transformer Models. Journal of Systems and Software 2025. Publications

Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. 2025. Transfer Learning for Software Vulnerability Prediction using Transformer Models. Journal of Systems and Software 2025.

Journal: Journal of Systems and Software, Volume 227, September 2025, 112448 Authors: Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. Abstract: Recently software security community has exploited text mining and deep learning methods to identify vulnerabilities. To this end, the progress in the field of Natural Language Processing (NLP)…
Digital Transformation of Security Standards: Requirements Extraction using LLMs Insights

Digital Transformation of Security Standards: Requirements Extraction using LLMs

By Miltiadis Siavvas,  Information Technologies Institute (ITI) of the Centre for Research and Technology-Hellas (CERTH) In this insight post, we present the approach CERTH proposes for enabling the automation of the identification and extraction of security requirements from security standards with Large Language Models (LLMs). Compliance with international security standards…
ECSO Webinar: „Actions Beyond Words: Automating Audits for Streamlined Cybersecurity Compliance in Europe” News

ECSO Webinar: „Actions Beyond Words: Automating Audits for Streamlined Cybersecurity Compliance in Europe”

ECSO organized a webinar with NIST, on how OSCAL can be applied to an information system for documenting and assessing its security controls and transition from a text-based and manual approach (using word processors or spreadsheets) to a set of standardised, machine-readable formats. Our colleagues Prof. Antonio Skarmeta and Sara…