Two-factor authentication
Start to annoy hackers today by using two-factor authentication (2FA)!
Start to annoy hackers today by using two-factor authentication (2FA)!
Christmas season is here again! Like you, your “favorite” cyber criminals are also waiting to get their presents. Here are my 3 free security tips for you to spoil their fun this Christmas season: Have a wonderful time with your beloved ones and stay secure!
πΈ How good are you at recognising AI-generated people? β Would you be sceptical if the person tried to connect with you on LinkedIn, for example? You can test yourself on these two sites: π Which Face Is Real?π thispersondoesnotexist.com
The Cyber Resilience Act (CRA) is a critical piece of legislation designed to enhance product cybersecurity across the EU. If youβre finding it challenging to navigate, youβre not alone – many organizations are seeking clarity on its implications. Last week, the EU Commission hosted an insightful webinar on the CRA, attracting over 2,500 participants from…
What a good start into the weekend π π The German BSI has published a guideline for developers regarding potential vulnerabilies in AI systems. π£ From my point of view, a security risk assessment on systems using AI technologies has to consider the attacks on the AI parts of the system as well. A security…
Critical infrastructure faces a growing number of security threats.. Critical infrastructure typically relies on Industrial Automation and Control Systems (IACS) and other non-IT components, often referred to as “Operational Technology.” To effectively assess cybersecurity risks within operational technology (OT) systems, adhering to the internationally recognized IEC 62443 standard is best practice. IEC 62443-3-2, part of…
Do you classify your documents? Here’s what you should consider!