The intermediate results of the BUGYO Beyond project have been validated by the CELTIC reviewers. A press conference at the Ecostart buidling followed to present these results.
Posts By: Ingo Senft
Security Research Conference 2010

A Protection Profile for Secure Information Sharing Among Critical Infrastructures, poster session. M. Aubigny et Carlo Harpes, 22-24 Septembre 2010.
Security Research Conference 2010

A Protection Profile for Secure Information Sharing Among Critical Infrastructures, poster session. M. Aubigny and C. Harpes, 22-24 September 2010. Links: Article
CRITIS 2010

Risk ontology and Service Quality Descriptor shared among interdependent Critical Infrastructures. M. Aubigny, C. Harpes, and M. Castrucci, September 2010. Links: Article
Hack.lu 2010
itrust consulting announces its participation to the Hack.lu conference that will be held from the 27th to the 29th of October 2010 at Parc Hotel Alvisse, Luxembourg. To confirm its engagement as a security expert in Luxembourg, itrust consulting has decided to be a Silver Sponsor.