Today, Stefan Fenz attends the European Security Round Table in Brussels. The European Security Round Table is a neutral platform between the EU Institutions, NATO and other relevant actors to discuss European security and defence issues.
Edgar Weippl presents the opening talk at this year’s ADV security event (IT-Sicherheit für Fortgeschrittene).
112 People visited our information security-specific program at Lange Nacht der Forschung 2009. The program hosted by Secure Business Austria comprised privacy issues, wireless security, password security, and forensics. EVVA supported our program by presenting the latest lock innovations to our visitors.
We are happy to announce that our SBA2 proposal has been accepted by the jury. The research grants enable us to continue our research till 2014. German press releases can be found at APA and FFG.
Martin Mulazzani & Edgar Weippl, Aktuelle Herausforderungen in der Datenbankforensik (more information)
Our paper “Ontology-based Generation of IT-Security Metrics” has been accepted at the 25th ACM Symposium on Applied Computing (SAC’2010).
On November 7 2009 16:27 – 00:00 Secure Business Austria hosts an information security-specific program at Lange Nacht der Forschung. The program comprises live demonstrations and awareness training in the fields of
- wireless security,
- password security,
- social engineering,
- mobile storage security,
- credit card fraud, and
- digital forensics.
We invite everybody to join us at Favoritenstrasse 16 1040 Wien.
SBA managing director Markus Klemen presents social engineering cases at this years’ “IKT-Sicherheitsseminar” of the Austrian Armed Forces Security Agency. See the program for further details.
SBA managing director Markus Klemen was interviewed and cited in Wednesdays’ “Die Presse” concerning the organizational and technical limitations of website blockers. Link to the online version: http://diepresse.com/home/panorama/oesterreich/512034/index.do?from=suche.intern.portal
Peter Kleissner presented his Stoned Bootkit and new research directions to circumvent full disk encryption.