Jantje Silomon 15 May 2023 Peeking under the Hood As mentioned in the last post, the ‘GPT’ part in ChatGPT stands for “Generative Pre-trained Transformer” – just one example of a transformer model in a family of many dozens. Two graphics by Xavier Amatriain illustrate the model boom and interrelationship nicely: Xavier Amatriain: Five years of models…
For the official opening of the IFSH research focus “International Cybersecurity”, the team around project leader Dr Mischa Hansel organised an event titled “With Zero Trust to Global Trust? International Cybersecurity in Light of the SolarWinds Attack”. More than 50 representatives from science, business, diplomacy, politics and the media took part in the interdisciplinary workshop. After an opening…
IFSH research focus International Cybersecurity recently held its second interdisciplinary workshop, focusing on which actors and procedures could advance the implementation of the UN norms of responsible state behaviour in cyberspace. The short presentations by Jacqueline Eggenschwiler (University of Oxford), Alexander Klimburg (Global Commission on the Stability of Cyberspace), Sheetal Kumar (Global Partners Digital) and Mischa Hansel (IFSH) shed…
The harmful effects of cross-border criminal cyber-attacks were made abundantly clear as hospitals, energy providers, and other infrastructure services were indiscriminately hit or even directly targeted last year. Meanwhile, UN member states embarked on a new negotiation process with the goal of creating a global convention against the criminal misuse of information and communication technology.…
End of June 2022 the ICS team conducted a workshop in cooperation with the Federal Foreign Office on cyber security within the framework of the dialogue processes on the German National Security Strategy. The hybrid event centred on four thematic blocks, each introduced by short keynote speeches followed by discussions, and was held under Chatham…
Vulnerabilities in hardware and software products are a gateway for cyber criminals, and state actors should thus be interested in promoting responsible disclosure and timely remediation. However, intelligence and security agencies also exploit vulnerabilities, sometimes holding vulnerabilities back or even actively seeking to acquire them. Thus, the role of state actors within the global vulnerability…