3 types of 2FA
Today you can learn about 3 types of two-factor authentication (2FA).
Today you can learn about 3 types of two-factor authentication (2FA).
What is the role of us security professionals when it comes to AI powered systems?
Since February 2022, cybersecurity threats to railways in the European Union have changed fundamentally: nation-state actors are no longer a theoretical possibility, but a dangerous reality. Russia is trying to sabotage European railways, warns Prague ๐ก We therefore need to increase the resilience of the railway system against attacks by very capable attackers with access…
If youโre evaluating whether your product falls under the Cyber Resilience Act (CRA), youโve likely encountered the term “Product with Digital Elements” (PDE). This term is central to the CRA, and understanding it is crucial. The Cyber Resilience Act (CRA) defines the scope of its regulations in Article 2, which explicitly references “products with digital…
How well do you know your IT? Learn which questions to ask!
Be careful, what you post in your social media profile! Unfortunately, this is valuable input for a potential attacker. Especially the layout of the ID is interesting, in this case even with a valid ID… ๐ In best case, the processes are designed in a way, that only this information will not lead to anything…
What a good start into the weekend ๐ ๐ The German BSI has published a guideline for developers regarding potential vulnerabilies in AI systems. ๐ฃ From my point of view, a security risk assessment on systems using AI technologies has to consider the attacks on the AI parts of the system as well. A security…