{"id":3542,"date":"2024-07-02T08:37:00","date_gmt":"2024-07-02T06:37:00","guid":{"rendered":"https:\/\/www.cyberagentur.de\/en\/press\/foundation-models-in-the-security-context-under-the-loupe\/"},"modified":"2025-05-22T14:17:55","modified_gmt":"2025-05-22T12:17:55","slug":"foundation-models-in-the-security-context-under-the-loupe","status":"publish","type":"post","link":"https:\/\/www.cyberagentur.de\/en\/press\/foundation-models-in-the-security-context-under-the-loupe\/","title":{"rendered":"Foundation models in the security context under the microscope"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-left\"><strong>Information and networks at the interface of AI and geodata<\/strong><\/h2>\n<div class='ce-spacer'><\/div>  <figure  class=\"wp-block-image  wp-block-image--alignment-center wp-block-image--margin-bottom-default align align wp-block-cyberagentur-image\">\n    <div class=\"wp-block-image__image-wrapper \">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"677\" src=\"\/wp-content\/uploads\/2024\/07\/SM-POST-Zitat-Daniel-1024x677.png\" class=\"attachment-large size-large\" alt=\"Dr. Daniel Gille, Leiter K\u00fcnstliche Intelligenz in der Abteilung Schl\u00fcsseltechnologie der Cyberagentur. Foto: Andreas Stedtler\/Cyberagentur\" srcset=\"\/wp-content\/uploads\/2024\/07\/SM-POST-Zitat-Daniel-1024x677.png 1024w, \/wp-content\/uploads\/2024\/07\/SM-POST-Zitat-Daniel-330x218.png 330w, \/wp-content\/uploads\/2024\/07\/SM-POST-Zitat-Daniel-768x508.png 768w, \/wp-content\/uploads\/2024\/07\/SM-POST-Zitat-Daniel-1536x1016.png 1536w, \/wp-content\/uploads\/2024\/07\/SM-POST-Zitat-Daniel-512x339.png 512w, \/wp-content\/uploads\/2024\/07\/SM-POST-Zitat-Daniel.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\n    <\/div>\n    <figcaption class=\"wp-element-caption\"><span class='description'>Dr. Daniel Gille, Leiter K\u00fcnstliche Intelligenz in der Abteilung Schl\u00fcsseltechnologie der Cyberagentur. Foto: Andreas Stedtler\/Cyberagentur<\/span> \n      \n      \n    <\/figcaption>\n  <\/figure>\n<p><strong>For the planned research project \u201cHolistic Evaluation of Generative Foundation Models in a Security Context\u201d (HEGEMON), the Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) is organizing a virtual partnering event on 31 July 2024. The event offers a platform for potential bidders and interested parties to inform themselves about the requirements and opportunities of the research project and to exchange ideas. <\/strong><\/p>\n\n<p>The term foundation model describes complex neural networks that have been trained on large, unspecific amounts of data and impress with their versatility in a wide range of applications. Foundation models are characterized by the fact that they can generate complex text, image or audio content based on free input (prompts). However, these models require a high initial training effort and comprehensive evaluation, particularly in the context of internal and external security.  <\/p>\n\n<p>With this in mind, the research team led by Dr. Daniel Gille, Head of Artificial Intelligence in the Cyberagentur&#8217;s Key Technologies department, has developed various research assignments and use cases. These and initial data sets from the Bundeswehr Geoinformation Center will later form part of the planned tender. \u201cThe research questions are divided into three main areas,\u201d explains scientist Dr. Daniel Gille: \u201cBenchmarking as a problem of interdisciplinary basic research, development of a holistic foundation model benchmark against the application background of geoinformation and development of a demonstrator for solving tasks in geoinformation.\u201d  <\/p>\n\n<p>The development of the benchmarks and adaptation of the basic models as well as their demonstrator implementation are to take place within the framework of the research project in a unique competitive constellation in which each participant is in direct comparison with all other participants in terms of both benchmark and model development. As part of the challenge, each model will be evaluated and ranked using all developed benchmarks &#8211; both in-house and third-party developments. <\/p>\n\n<p>The partnering event on July 31, 2024, from 1:30 to 3:30 pm, offers the opportunity to learn more about this research project and to exchange ideas with potential partners.\nFurther information on the event and registration can be found on the research project website. <\/p>\n\n<p><strong>Further information and registration:<\/strong> <\/p>\n\n<p><a href=\"https:\/\/www.cyberagentur.de\/hegemon\">https:\/\/www.cyberagentur.de\/hegemon<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information and networks at the interface of AI and geodata For the planned research project \u201cHolistic Evaluation of Generative Foundation Models in a Security Context\u201d (HEGEMON), the Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) is organizing a virtual partnering event on 31 July 2024. The event offers a platform for potential bidders and interested [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":2347,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[52],"tags":[],"class_list":["post-3542","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-key-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Foundation models in the security context under the microscope - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/press\/foundation-models-in-the-security-context-under-the-loupe\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Foundation models in the security context under the microscope - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"Information and networks at the interface of AI and geodata For the planned research project \u201cHolistic Evaluation of Generative Foundation Models in a Security Context\u201d (HEGEMON), the Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) is organizing a virtual partnering event on 31 July 2024. The event offers a platform for potential bidders and interested [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/press\/foundation-models-in-the-security-context-under-the-loupe\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-02T06:37:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-22T12:17:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/07\/SM-POST-Zitat-Daniel.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1270\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ML\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ML\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/foundation-models-in-the-security-context-under-the-loupe\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/foundation-models-in-the-security-context-under-the-loupe\\\/\"},\"author\":{\"name\":\"ML\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\"},\"headline\":\"Foundation models in the security context under the microscope\",\"datePublished\":\"2024-07-02T06:37:00+00:00\",\"dateModified\":\"2025-05-22T12:17:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/foundation-models-in-the-security-context-under-the-loupe\\\/\"},\"wordCount\":370,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/foundation-models-in-the-security-context-under-the-loupe\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/SM-POST-Zitat-Daniel.png\",\"articleSection\":[\"Key technology\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/foundation-models-in-the-security-context-under-the-loupe\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/foundation-models-in-the-security-context-under-the-loupe\\\/\",\"name\":\"Foundation models in the security context under the microscope - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/foundation-models-in-the-security-context-under-the-loupe\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/foundation-models-in-the-security-context-under-the-loupe\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/SM-POST-Zitat-Daniel.png\",\"datePublished\":\"2024-07-02T06:37:00+00:00\",\"dateModified\":\"2025-05-22T12:17:55+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/foundation-models-in-the-security-context-under-the-loupe\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/foundation-models-in-the-security-context-under-the-loupe\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/foundation-models-in-the-security-context-under-the-loupe\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/SM-POST-Zitat-Daniel.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/SM-POST-Zitat-Daniel.png\",\"width\":1920,\"height\":1270,\"caption\":\"Dr. Daniel Gille, Leiter K\u00fcnstliche Intelligenz in der Abteilung Schl\u00fcsseltechnologie der Cyberagentur. Foto: Andreas Stedtler\\\/Cyberagentur\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/foundation-models-in-the-security-context-under-the-loupe\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Foundation models in the security context under the microscope\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\",\"name\":\"ML\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Foundation models in the security context under the microscope - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/press\/foundation-models-in-the-security-context-under-the-loupe\/","og_locale":"en_GB","og_type":"article","og_title":"Foundation models in the security context under the microscope - Cyberagentur","og_description":"Information and networks at the interface of AI and geodata For the planned research project \u201cHolistic Evaluation of Generative Foundation Models in a Security Context\u201d (HEGEMON), the Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) is organizing a virtual partnering event on 31 July 2024. The event offers a platform for potential bidders and interested [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/press\/foundation-models-in-the-security-context-under-the-loupe\/","og_site_name":"Cyberagentur","article_published_time":"2024-07-02T06:37:00+00:00","article_modified_time":"2025-05-22T12:17:55+00:00","og_image":[{"width":1920,"height":1270,"url":"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/07\/SM-POST-Zitat-Daniel.png","type":"image\/png"}],"author":"ML","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ML","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberagentur.de\/en\/press\/foundation-models-in-the-security-context-under-the-loupe\/#article","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/foundation-models-in-the-security-context-under-the-loupe\/"},"author":{"name":"ML","@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942"},"headline":"Foundation models in the security context under the microscope","datePublished":"2024-07-02T06:37:00+00:00","dateModified":"2025-05-22T12:17:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/foundation-models-in-the-security-context-under-the-loupe\/"},"wordCount":370,"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/foundation-models-in-the-security-context-under-the-loupe\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2024\/07\/SM-POST-Zitat-Daniel.png","articleSection":["Key technology"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/press\/foundation-models-in-the-security-context-under-the-loupe\/","url":"https:\/\/www.cyberagentur.de\/en\/press\/foundation-models-in-the-security-context-under-the-loupe\/","name":"Foundation models in the security context under the microscope - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/foundation-models-in-the-security-context-under-the-loupe\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/foundation-models-in-the-security-context-under-the-loupe\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2024\/07\/SM-POST-Zitat-Daniel.png","datePublished":"2024-07-02T06:37:00+00:00","dateModified":"2025-05-22T12:17:55+00:00","author":{"@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942"},"breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/foundation-models-in-the-security-context-under-the-loupe\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/press\/foundation-models-in-the-security-context-under-the-loupe\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cyberagentur.de\/en\/press\/foundation-models-in-the-security-context-under-the-loupe\/#primaryimage","url":"\/wp-content\/uploads\/2024\/07\/SM-POST-Zitat-Daniel.png","contentUrl":"\/wp-content\/uploads\/2024\/07\/SM-POST-Zitat-Daniel.png","width":1920,"height":1270,"caption":"Dr. Daniel Gille, Leiter K\u00fcnstliche Intelligenz in der Abteilung Schl\u00fcsseltechnologie der Cyberagentur. Foto: Andreas Stedtler\/Cyberagentur"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/press\/foundation-models-in-the-security-context-under-the-loupe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"Foundation models in the security context under the microscope"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942","name":"ML"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/3542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/comments?post=3542"}],"version-history":[{"count":2,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/3542\/revisions"}],"predecessor-version":[{"id":5140,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/3542\/revisions\/5140"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media\/2347"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=3542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/categories?post=3542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/tags?post=3542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}