Tag: conference
-
USENIX 2025: PEPR ’25 Breaking Barriers, Not Privacy: Real-World Split Learning Across Healthcare Systems
Creator, Author and Presenter: Sravan Kumar Elineni Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-pepr-25-breaking-barriers-not-privacy-real-world-split-learning-across-healthcare-systems/
-
Highlights von der Sicherheitsmesse it-sa Statements von der Netzpalaver-Community
Unisono waren die Mitglieder der Netzpalaver-Community von der diesjährigen it-sa begeistert. Kein Wunder, denn die , die größte Fachmesse für IT-Sicherheit in Europa, lockte nicht nur das Who is Who der Cybersecurity-Branche nach Nürnberg, sondern vor allem wieder tausende von Besucher, die angesichts der aktuellen Bedrohungslage, den neuen regulatorischen Anforderungen und der Vielzahl an […]…
-
USENIX 2025: PEPR ’25 When Privacy Guarantees Meet Pre-Trained LLMs: A Case Study In Synthetic Data
Creators, Authors and Presenters: Yash Maurya and Aman Priyanshu, Carnegie Mellon University Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-pepr-25-when-privacy-guarantees-meet-pre-trained-llms-a-case-study-in-synthetic-data/
-
USENIX 2025: PEPR ’25 When Privacy Guarantees Meet Pre-Trained LLMs: A Case Study In Synthetic Data
Creators, Authors and Presenters: Yash Maurya and Aman Priyanshu, Carnegie Mellon University Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-pepr-25-when-privacy-guarantees-meet-pre-trained-llms-a-case-study-in-synthetic-data/
-
USENIX 2025: PEPR ’25 When Privacy Guarantees Meet Pre-Trained LLMs: A Case Study In Synthetic Data
Creators, Authors and Presenters: Yash Maurya and Aman Priyanshu, Carnegie Mellon University Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-pepr-25-when-privacy-guarantees-meet-pre-trained-llms-a-case-study-in-synthetic-data/
-
USENIX 2025: PEPR ’25 Panel: How Privacy Engineers Can Shape The Coming Wave Of AI Governance
Moderator, Panelists: Moderator – Zachary Kilhoffer, Dynatrace; Panelists: Hoang Bao, Axon; Masooda Bashir, University of Illinois at Urbana-Champaign; Debra Farber, Lumin Digital; Sarah Lewis Cortes, Netflix and NIST; Akhilesh Srivastava, IOPD Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com…
-
USENIX 2025: PEPR ’25 Building Privacy Products: Field Notes
Creator, Author and Presenter: Miguel Guevara, Google Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-pepr-25-building-privacy-products-field-notes/
-
USENIX 2025: PEPR ’25 Building Privacy Products: Field Notes
Creator, Author and Presenter: Miguel Guevara, Google Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-pepr-25-building-privacy-products-field-notes/
-
Public disclosures of AI risk surge among S&P 500 companies
A report by The Conference Board shows companies are flagging concerns about reputational and cyber-risk as they increase deployment. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/public-disclosures-ai-risk-surge-companies/802236/
-
Public disclosures of AI risk surge among S&P 500 companies
A report by The Conference Board shows companies are flagging concerns about reputational and cyber-risk as they increase deployment. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/public-disclosures-ai-risk-surge-companies/802236/
-
it-sa 2025: Fast 1.000 Security-Anbieter am Start
Weggefährten der it-sa auf der ersten Pressekonferenz (von links): Claudia Plattner, BSI-Präsidentin, Ralf Wintergerst, Präsident des Bitkom, Prof. Norbert Pohlmann, Vorsitzender des Bundesverbandes für IT-Sicherheit ‘TeleTrusT” und Joanna ÅšwiÄ…tkowska von der European Cyber Security Organisation (ECSO). Horst EllermannSeit Dienstag, 7. Oktober 2025, läuft die it-sa 2025. Zu Besucherzahlen äußert sich Thimo Holst, der Verantwortliche bei der…
-
it-sa 2025: Fast 1.000 Security-Anbieter am Start
Weggefährten der it-sa auf der ersten Pressekonferenz (von links): Claudia Plattner, BSI-Präsidentin, Ralf Wintergerst, Präsident des Bitkom, Prof. Norbert Pohlmann, Vorsitzender des Bundesverbandes für IT-Sicherheit ‘TeleTrusT” und Joanna ÅšwiÄ…tkowska von der European Cyber Security Organisation (ECSO). Horst EllermannSeit Dienstag, 7. Oktober 2025, läuft die it-sa 2025. Zu Besucherzahlen äußert sich Thimo Holst, der Verantwortliche bei der…
-
Erstmals fünf Messehallen: it-sa ExpoCongress 2025 startet mit über 950 Ausstellern
Tags: conferenceFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/5-messehallen-it-sa-expocongress-2025-950-aussteller
-
Erstmals fünf Messehallen: it-sa ExpoCongress 2025 startet mit über 950 Ausstellern
Tags: conferenceFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/5-messehallen-it-sa-expocongress-2025-950-aussteller
-
Deutscher Markt für IT-Sicherheit wächst zweistellig
Ausgaben für IT-Sicherheit steigen um 10,1 Prozent auf 11,1 Milliarden Euro. 6 von 10 Unternehmen halten Cyberattacken für existenzbedrohend. Mit der it-sa startet Europas größte Fachmesse für IT-Sicherheit in Nürnberg. Deutschland rüstet sich gegen Cyberattacken und investiert verstärkt in IT-Sicherheit. Im laufenden Jahr werden die Ausgaben voraussichtlich um 10,1 Prozent auf 11,1 Milliarden Euro zulegen,……
-
TDL 006 – Beyond the Firewall: How Attackers Weaponize Your DNS
Tags: access, attack, breach, business, cisa, ciso, computer, conference, control, cyber, data, data-breach, dns, exploit, firewall, google, government, group, guide, infrastructure, intelligence, Internet, iraq, jobs, leak, malicious, malware, network, phishing, ransomware, service, software, switch, threat, tool, windowsSummary Beyond the Firewall: How Attackers Weaponize Your DNS For many IT professionals, DNS is the internet’s invisible plumbing, historically managed by a “guy with a Unix beard in the basement,” as Infoblox educator Josh Kuo recalled on the Defenders Log podcast. But this foundational, often overlooked, protocol has become a primary vector for sophisticated…
-
Datenaustausch-Plattform verbindet Automatisierung, Sicherheit und Compliance Made in Germany
FTAPI präsentiert auf der it-sa seine Plattform für sicheren Datenaustausch und stellt mit ein neues Produkt vor, das sicheren Datenaustausch erstmals tief in die Kernprozesse von Unternehmen integriert und automatisiert. Mit Secuflows-Advanced lassen sich Geschäftsprozesse in einem Schritt revisionssicher dokumentieren, digitalisieren und automatisieren. FTAPIs Herzstück der sichere, verschlüsselte Datenaustausch ist tief […] First seen on…
-
Europol Calls for Stronger Data Laws to Combat Cybercrime
Europol’s Cybercrime Conference has warned that cybercriminals are exploiting new technologies faster than law enforcement can adapt First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/europol-calls-stronger-data-laws/
-
it-sa 2025 – Security-Visionen auf der it-sa live erleben
Tags: conferenceFirst seen on security-insider.de Jump to article: www.security-insider.de/it-sa-2025-ausblick-cybersicherheit-2026-a-6a04cefc98320c7f931ac9f549798bcb/
-
The Guardian view on the Jaguar Land Rover cyber-attack: ministers must pay more attention to this growing risk | Editorial
Tags: attack, business, computer, conference, cyber, cybercrime, finance, government, risk, supply-chain, threatCybercriminals pose a seismic and increasingly sophisticated threat to businesses and national security. Yet Britain seems remarkably ill-preparedThe cause isn’t clear, but the impact has already been devastating. More than a month has passed since Jaguar Land Rover (JLR) was targeted in a cyber-attack that forced the car manufacturer to turn off computers and shut…
-
USENIX 2025: PEPR ’25 Career Advice For Privacy Engineers: From Resume To Interview To Finding The Next Job
Creator, Author And Presenters: Jason A. Novak, Google Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-pepr-25-career-advice-for-privacy-engineers-from-resume-to-interview-to-finding-the-next-job/
-
USENIX 2025: PEPR ’25 Verifying Humanness: Personhood Credentials For The Digital Identity Crisis
Creator, Author and Presenter: Tanusree Sharma, Pennsylvania State University Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-pepr-25-verifying-humanness-personhood-credentials-for-the-digital-identity-crisis/
-
Your Guide to EDUCAUSE 2025: What Higher-Ed Leaders Need to Know
What is EDUCAUSE 2025? The EDUCAUSE Annual Conference is where higher education’s technology and strategy communities come together. In 2025, it will be October 2730 in Nashville, with a follow-up online program on November 1213. The theme this year is “Restoring Trust”. It reflects the crossroads higher ed finds itself in: students and families expect……
-
USENIX 2025: PEPR ’25 Harnessing LLMs for Scalable Data Minimization
Creators, Authors and Presenters: Charles de Bourcy, OpenAI Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-pepr-25-harnessing-llms-for-scalable-data-minimization/
-
USENIX 2025: PEPR ’25 Data Classification at Scale: Taming the Hydra
Creators, Authors and Presenters: Daniel Gagne, Meta Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-pepr-25-data-classification-at-scale-taming-the-hydra/
-
USENIX 2025: PEPR ’25 Network Structure And Privacy: The Re-Identification Risk In Graph Data
Creator, Author and Presenter: Daniele Romanini, Resolve Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-pepr-25-network-structure-and-privacy-the-re-identification-risk-in-graph-data/
-
USENIX 2025: Building An EndEnd De-Identification Pipeline For Advertising Activity Data At LinkedIn
Creators, Authors and Presenters: Saikrishna Badrinarayanan and Chris Harris, LinkedIn Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-building-an-end-to-end-de-identification-pipeline-for-advertising-activity-data-at-linkedin/
-
USENIX 2025: PEPR ’25 Practical Considerations For Differential Privacy
Creator, Author and Presenter: Alex Kulesza Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/usenix-2025-pepr-25-practical-considerations-for-differential-privacy/
-
Ausblick: Check Point Software Technologies, Tenable Network Security und LANCOM Systems auf der it-sa 2025
Auf dem Controlware Security Day 2025 im hessischen Hanau hatten wir die Gelegenheit, mit drei anwesenden Controlware-Partnern kurze Videostatements aufzuzeichnen. Darin sprechen Thomas Boele von Check Point Software Technologies, Matthias Fraunhofer von Tenable Networks Security und Thomas Ehrlich von LANCOM Systems über das Security-Event it-sa ExpoCongress, das Anfang Oktober in Nürnberg stattfindet. Konkret wollten wir…
-
USENIX 2025: PEPR ’25 Establishing Privacy Metrics For Genomic Data Analysis
Creator, Author and Presenter: Curtis Mitchell, xD, United States Census Bureau Additional Authors: Gary Howarth And Justin Wagner, NIST; Jess Stahl, Census; Christine Task And Karan Bhagat, Knexus; Amy Hilla And Rebecca Steinberg, MITRE Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First…

