IT/IoT attacks in 2022
OT / IoT attacks and supply chain attacks are considered as 2 of the 10 most “hot trends” in cybersecurity 2022.
6 hot cybersecurity trends โ and 2 going cold | CSO Online
OT / IoT attacks and supply chain attacks are considered as 2 of the 10 most “hot trends” in cybersecurity 2022.
6 hot cybersecurity trends โ and 2 going cold | CSO Online
We are already seeing real-world applications of artificial intelligence in the rail sector. Deutsche Bahn is using artificial intelligence to reduce delays on its network. My prediction: This is just the beginning of ML/AI applications in our sector. We will see machine learning and AI algorithms becoming more and more widespread in the coming years….
There was an interesting article published about Bing’s AI chat bot using a LLM (Large Language Model) this weekend in the New York Times. A clear recommendation for reading:Why a Conversation With Bingโs Chatbot Left Me Deeply Unsettled – The New York Times
Christmas season is here again! Like you, your “favorite” cyber criminals are also waiting to get their presents. Here are my 3 free security tips for you to spoil their fun this Christmas season: Have a wonderful time with your beloved ones and stay secure!
In this post, I delve into the most relevant standards that secure our railway systems. Using Europe and Germany as a case study for the local and national level of standards, the following infographics provides a comprehensive overview of the most relevant standards helping to increase security on the tracks. ๐ Download infographics as pdf:…
Critical infrastructure faces a growing number of security threats.. Critical infrastructure typically relies on Industrial Automation and Control Systems (IACS) and other non-IT components, often referred to as “Operational Technology.” To effectively assess cybersecurity risks within operational technology (OT) systems, adhering to the internationally recognized IEC 62443 standard is best practice. IEC 62443-3-2, part of…
Despite the Easter holidays, a lot of incredible work was done over the weekend by many researchers analysing the details of the xz-utils backdoor. Some examples are: As the situation unfolds, it is becoming clear that this was not just one of the most sophisticated technical (perhaps the most sophisticated) attempts to introduce a backdoor…