News

ATHENE position paper calls for data protection precautions

Cyber­security researchers are often unable to comply with data protection regulations because they do not know before the start of a research activity whether and what personal data they will be processing. Our data protection experts have therefore formulated a proposed addition to the GDPR. Their concern: The legally binding introduction of data protection precautions that take unplanned data access into account.

read more

ATHENE CEO appointed as Editor-in-Chief of ACM TOPS

The ACM Transactions on Privacy and Security (TOPS), one of the most established and renowned scientific journals in the field of cybersecurity and privacy technology, has appointed ATHENE Director Prof. Michael Waidner as Editor-in-Chief. His term runs from February 1, 2024 to January 31, 2027.

read more

ATHENE researcher develops an AI assistant for researchers

The Ubiquitous Knowledge Processing (UKP) Lab led by ATHENE researcher Prof. Iryna Gurevych at TU Darmstadt has received the Amazon University Collaboration Award. As part of the funding, the research team will collaborate with AI researchers from Amazon Alexa in Berlin. Together, they are developing a "virtual research assistant" that helps researchers quickly and reliably close their own knowledge gaps by answering their questions.

read more

BSI President Claudia Plattner visits ATHENE

During a working meeting with ATHENE Director Prof. Michael Waidner and ATHENE Board of Directors member Prof. Haya Shulman, she exchanged views on current cybersecurity issues.

read more

AIGIS-Lab

ATHENE scientist Prof. Haya Shulman is the coordinator of the "Real Lab for Modern Cyber­security in Research Institutions" (AIGIS) project, in which two research institutions are being used as examples to demonstrate what modern cybersecurity architecture can look like. To this end, the researchers are developing a requirements analysis for the construction of an exemplary zero-trust architecture and its evaluation in a real laboratory. To this end, representative substructures in the form of networks, central infrastructures and various institutes will first be selected in both research institutions and analyzed with regard to their requirements. Based on this, the researchers will develop an appropriate, modern cybersecurity architecture.

read more