News


  • ChatGPT, Bing Search, Bard & Friends – Part II

    Jantje Silomon 15 May 2023 Peeking under the Hood As mentioned in the last post, the ‘GPT’ part in ChatGPT stands for “Generative Pre-trained Transformer” – just one example of a transformer model in a family of many dozens. Two graphics by Xavier Amatriain illustrate the model boom and interrelationship nicely: Xavier Amatriain: Five years of models…

  • Kick-off Workshop on “Zero Trust”

    For the official opening of the IFSH research focus “International Cybersecurity”, the team around project leader Dr Mischa Hansel organised an event titled “With Zero Trust to Global Trust? International Cybersecurity in Light of the SolarWinds Attack”. More than 50 representatives from science, business, diplomacy, politics and the media took part in the interdisciplinary workshop. After an opening…

  • Workshop on the Implementation of UN Cyber Norms

    IFSH research focus International Cybersecurity recently held its second interdisciplinary workshop, focusing on which actors and procedures could advance the implementation of the UN norms of responsible state behaviour in cyberspace. The short presentations by Jacqueline Eggenschwiler (University of Oxford), Alexander Klimburg (Global Commission on the Stability of Cyberspace), Sheetal Kumar (Global Partners Digital) and Mischa Hansel (IFSH) shed…

  • Workshop on Promises and Pitfalls of a Global Cybercrime Convention

    The harmful effects of cross-border criminal cyber-attacks were made abundantly clear as hospitals, energy providers, and other infrastructure services were indiscriminately hit or even directly targeted last year. Meanwhile, UN member states embarked on a new negotiation process with the goal of creating a global convention against the criminal misuse of information and communication technology.…

  • Workshop on the Cybersecurity Chapter of the German National Security Strategy

    End of June 2022 the ICS team conducted a workshop in cooperation with the Federal Foreign Office on cyber security within the framework of the dialogue processes on the German National Security Strategy. The hybrid event centred on four thematic blocks, each introduced by short keynote speeches followed by discussions, and was held under Chatham…

  • Workshop on Government Vulnerability Disclosure

    Vulnerabilities in hardware and software products are a gateway for cyber criminals, and state actors should thus be interested in promoting responsible disclosure and timely remediation. However, intelligence and security agencies also exploit vulnerabilities, sometimes holding vulnerabilities back or even actively seeking to acquire them. Thus, the role of state actors within the global vulnerability…

Archive