Two-factor authentication
Start to annoy hackers today by using two-factor authentication (2FA)!
Start to annoy hackers today by using two-factor authentication (2FA)!
This month I’ve earned the Information Security Risk Manager. ISO/IEC 27005 certification of rigcert.education. Having multiple years of experience in managing security risks in OT environments according to IEC 62443-3-2, the ISO 27005 provides an extended perspective on risk management. Effective information security risk management is crucial for maintaining secure systems. Failing to properly assess…
This week: Learn about the three fundamentals of security: 🔒confidentiality, 🏡 integrity and 🟢 availability
Maximilian Hedrich – Post | LinkedIn An example of what AI already is able to deliver today. We will need to deal with the issue of authenticity of voice and video in a AI driven future in a different way, than we did up to now. It’s not a question of “Will this technology be…
Critical infrastructure faces a growing number of security threats.. Critical infrastructure typically relies on Industrial Automation and Control Systems (IACS) and other non-IT components, often referred to as “Operational Technology.” To effectively assess cybersecurity risks within operational technology (OT) systems, adhering to the internationally recognized IEC 62443 standard is best practice. IEC 62443-3-2, part of…
Christmas season is here again! Like you, your “favorite” cyber criminals are also waiting to get their presents. Here are my 3 free security tips for you to spoil their fun this Christmas season: Have a wonderful time with your beloved ones and stay secure!
Real time AI applications can bring huge benefits but also come with (social) risks we will have to deal with. The example below is a good demonstration of what is possible today. I’m very curious regarding the public discussion on how we will balance benefits vs. risks of such applications without killing technological progress in…