• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Profiles
  • Home
  • /Profiles

Martin Gilje Jaatun

2022–2024 Distinguished Visitor

Featured ImageFeatured Image

Dr. Martin Gilje Jaatun is a Senior Scientist at SINTEF Digital in Trondheim, Norway, and an Adjunct Professor at the University of Stavanger. He graduated from the Norwegian Institute of Technology (NTH) in 1992 and holds a Dr.Philos. degree from the University of Stavanger. Previous positions include senior consultant at System Sikkerhet AS, scientist at the Norwegian Defence Research Establishment (FFI), and Senior Lecturer in information security at the Bodø Graduate School of Business. He is vice chairman of the Cloud Computing Association (cloudcom.org), vice-chair of IEEE TCCLD, vice-chair of IEEE CS STC Blockchain, and a Senior Member of the IEEE. He is also an IEEE Cybersecurity ambassador.

 

Email: gilje@ieee.org

DVP term expires December 2024


Presentations

An introduction to cybersecurity and industrial applications

Stuxnet may have been the first "I told you so" moment for security experts who have been crying wolf about lack of security in industrial applications since the previous millennium, but there have been a number of equally serious incidents in the recent past. This talk will give a brief introduction to some of these incidents, highlighting important trends and the need for increased vigilance.

Introduction to Software Security

Software security means creating software in such a manner that it continues to operate as expected, also under malicious attack. This talk will outline the difference between security bugs and architectural flaws, and provide examples of software development activities that contribute to better software security.

5 things that you should not use blockchain for

The Bitcoin cryptocurrency keeps cropping up in the news. Cryptocurrencies are based on blockchain, a digital, public distributed ledger. The main motivation for cryptocurrencies relates to uncertainties related to intermediaries. Many are now advocating using blockchain as a universal solution for transactions, whether it is goods, services, or information that needs to be transferred or exchanged. Unfortunately, it’s not that simple.

Some people compare blockchains to giant spreadsheets, where all transactions between given parties are registered and approved. Every time a new transaction is performed, it is added to the blockchain – and also copied to all users. The result is a solution that is independent of intermediaries – all the blockchain participants have the same information at a given time, which enables making the majority to adjudicate any disagreements.

Running a blockchain is not free, however, and there are some strict requirements on the operations the users must perform. This contributes to making blockchains unsuited to fulfilling some of the expectations they are met with. In this talk, we will briefly cover the basics of what a blockchain is, and then go on to describe five application areas where blockchain probably cannot provide a good solution.

LATEST NEWS
How to Evaluate LLMs and GenAI Workflows Holistically
How to Evaluate LLMs and GenAI Workflows Holistically
The Kill Switch of Vengeance: The Double-Edged Sword of Software Engineering Talent
The Kill Switch of Vengeance: The Double-Edged Sword of Software Engineering Talent
Exploring the Elegance and Applications of Complexity and Learning in Computer Science
Exploring the Elegance and Applications of Complexity and Learning in Computer Science
IEEE CS and ACM Honor Saman Amarasinghe with 2025 Ken Kennedy Award
IEEE CS and ACM Honor Saman Amarasinghe with 2025 Ken Kennedy Award
IEEE Std 3221.01-2025: IEEE Standard for Blockchain Interoperability—Cross Chain Transaction Consistency Protocol
IEEE Std 3221.01-2025: IEEE Standard for Blockchain Interoperability—Cross Chain Transaction Consistency Protocol
Read Next

How to Evaluate LLMs and GenAI Workflows Holistically

The Kill Switch of Vengeance: The Double-Edged Sword of Software Engineering Talent

Exploring the Elegance and Applications of Complexity and Learning in Computer Science

IEEE CS and ACM Honor Saman Amarasinghe with 2025 Ken Kennedy Award

IEEE Std 3221.01-2025: IEEE Standard for Blockchain Interoperability—Cross Chain Transaction Consistency Protocol

Celebrate IEEE Day 2025 with the IEEE Computer Society

Building Community Through Technology: Sardar Patel Institute of Technology (SPIT) Student Chapter Report

IEEE CS and ACM Announce Recipients of 2025 George Michael Memorial HPC Fellowship

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter