Two-factor authentication
Start to annoy hackers today by using two-factor authentication (2FA)!
Start to annoy hackers today by using two-factor authentication (2FA)!
What a good start into the weekend 😎 📄 The German BSI has published a guideline for developers regarding potential vulnerabilies in AI systems. 📣 From my point of view, a security risk assessment on systems using AI technologies has to consider the attacks on the AI parts of the system as well. A security…
OT / IoT attacks and supply chain attacks are considered as 2 of the 10 most “hot trends” in cybersecurity 2022. 6 hot cybersecurity trends — and 2 going cold | CSO Online
Currently a lot of standardization projects regarding the CRA are on-going. These standardization projects aim to develop harmonized European standards for the fundamental cybersecurity requirements of the CRA and the requirements regarding vulnerability management (horizontal standards) as well as different product categories (vertical standards). You can find an overview over the currently active standardization projects…
Cables for GSM-R were intentionally cut this morning in northern Germany. This is a very serious incident and has to be carefully investigated with regard to the motivation of the attackers. Link to article of German newspaper “Die Zeit” (08.10.2022)
How well do you know your IT? Learn which questions to ask!
The EU Commission services have just released a comprehensive FAQ to help to demystify the implementation of the Cyber Resilience Act. If the official text left you scratching your head, this 66-page document might be your go-to resource for first practical answers to your questions. Worth a bookmark. Read it here:EU Commission – CRA Implementation