Skip to main content

DSI Publications

Report

Cybersecurity international: Unterschiedliche Prioritäten [International cybersecurity: Different priorities]

In Digitalpolitik: Eine Einführung, edited by Lorena Jaume-Palasí, Julia Pohle, Matthias Spielkamp, 19–26. Berlin: Wikimedia.
Subject(s)
Information technology and systems
Keyword(s)
Cybersecurity, National Security, Human Rights, Conflicts
Secondary Title
Digitalpolitik: Eine Einführung
Pages
19–26
Report

The security of components: An evaluation of physical and logical attacks

NXP
This proprietary study was commissioned by NXP.
Sandro Gaycken, Georg T. Becker (2017)
Subject(s)
Technology, R&D management
DSI Industrial & Policy Recommendations Series (IPR)

Crypto-debate: Strategies for responsible behavior of law enforcement and intelligence agencies on matters of cryptography, vulnerabilities and tools

DSI Industrial & Policy Recommendations Series (IPR) 2017 (3)
Martin Schallbruch (2017)
Subject(s)
Technology, R&D management
Keyword(s)
Cryptograpy, intelligence agencies, IT security law, IT security regulation, industrial recommendations
JEL Code(s)
O30, O33, O38
In January 2017, the Digital Society Institute hosted a workshop on the “Crypto-debate: Strategies for responsible dealings with security agencies on matters of cryptography, vulnerabilities and tools.” Dr. Stefan Grosse (Federal Ministry of the Interior), Ralf Koenzen (Lancom Systems), Linus Neumann (Chaos Computer Club) and Stefan Heumann (Stiftung Neue Verantwortung) contributed to the workshop.
This issue contains German text and English translation in one file.
Volume
2017
DSI Industrial & Policy Recommendations Series (IPR)

Requirements for data protection and IT security law regarding technology development

DSI Industrial & Policy Recommendations Series (IPR) 2017 (2)
Martin Schallbruch (2017)
Subject(s)
Technology, R&D management
Keyword(s)
data protection, privacy, IT security law, IT security regulation, industrial recommendations, EU General Data Protection Regulation (GDPR), cyberthreats
JEL Code(s)
O30, O33, O38
In December 2016, the Digital Society Institute hosted a workshop on requirements to create a compatibility of data protection and IT security regulation. Contributions to the workshop were given by Marit Hansen (ULD Schleswig-Holstein), Tomasz Lawicki (TeleTrusT working group “State of the Art Technology”), Steve Ritter (BSI) and Johannes Schlattmann (LVM).
The issue contains German text and English translation in one file.
Volume
2017
DSI Industrial & Policy Recommendations Series (IPR)

Vulnerabilities in IT-security products

DSI Industrial & Policy Recommendations Series (IPR) 2017 (1)
Subject(s)
Technology, R&D management
Keyword(s)
IT security products, IT security, IT-sec industry, industrial recommendations, hacking
In October 2016, the Digital Society Institute hosted a workshop dedicated to the topic of vulnerabilities at large and in particular of vulnerabilities in security products. The workshop included talks from Thomas Dullien (former Google Project Zero), Matthias Luft (ERNW), Dr. Christoph Peylo (T-Labs) and a comment from Michael Kranawetter, (Head of Information Security Microsoft Germany).
Volume
2017
Report

Cyberreadiness in kleinen und mittleren Unternehmen [Cyber-readiness in small and medium sized companies]

Deutscher Industrie- und Handelskammertag (DIHK)
Sandro Gaycken, Rex Hughes (2015)
Subject(s)
Economics, politics and business environment; Ethics and social responsibility
Pages
79
Report

National CSIRTs and their role in computer security incident response

New America Foundation and Global Public Policy Institute
Robert Morgus, Isabel Skierka, Mirko Hohmann, Tim Maurer (2015)
Subject(s)
Information technology and systems
Keyword(s)
Cyber security, incident response, critical infrastructures