Security for Safety pitch at it-sa 2021
A short excerpt from my pitch on ‘Security for Safety’ as part of the BW-International Session at it-sa 2021 is available here:
A short excerpt from my pitch on ‘Security for Safety’ as part of the BW-International Session at it-sa 2021 is available here:
This post is a great example, that a spear phishing attack also works in the offline world. It does not always have to be an e-mail! Thank you to Marc Torke for sharing this. The letter in the picture is claiming to come from an official German court and was sent to a newly founded…
For me, yesterday was the last day of InnoTrans for this year. Now I have to rest my feet (of course in our red socks!). During this week, I’ve walked countless miles, talked to incredibly interesting people and once again experienced the wide range of products and services necessary to make our railway system work….
What is the role of us security professionals when it comes to AI powered systems?
Just registered for Google I/O 2022 (remote). Looking forward to get new ideas and insights into the latest tends of AI/Machine learning, cloud computing and security.
Despite the Easter holidays, a lot of incredible work was done over the weekend by many researchers analysing the details of the xz-utils backdoor. Some examples are: As the situation unfolds, it is becoming clear that this was not just one of the most sophisticated technical (perhaps the most sophisticated) attempts to introduce a backdoor…
Critical infrastructure faces a growing number of security threats.. Critical infrastructure typically relies on Industrial Automation and Control Systems (IACS) and other non-IT components, often referred to as “Operational Technology.” To effectively assess cybersecurity risks within operational technology (OT) systems, adhering to the internationally recognized IEC 62443 standard is best practice. IEC 62443-3-2, part of…