3 types of 2FA
Today you can learn about 3 types of two-factor authentication (2FA).
Today you can learn about 3 types of two-factor authentication (2FA).
What are the emerging cybersecurity threats for 2030? ENISA risks a glimpse into our future… ENISA Foresight Cybersecurity Threats for 2030 | ENISA Be aware that supply chain attacks are on their way to becoming the number 1 threat, according to ENISA. From my point of view, this topic is currently underestimated and we might…
Security basics: What is a vulnerability?
Maximilian Hedrich – Post | LinkedIn An example of what AI already is able to deliver today. We will need to deal with the issue of authenticity of voice and video in a AI driven future in a different way, than we did up to now. It’s not a question of “Will this technology be…
📸 How good are you at recognising AI-generated people? ❓ Would you be sceptical if the person tried to connect with you on LinkedIn, for example? You can test yourself on these two sites: 🌐 Which Face Is Real?🌐 thispersondoesnotexist.com
Do you classify your documents? Here’s what you should consider!
This was my start into the new week this morning! 🌞🚴 This week I’m at one of our customers laboratories. Certain tests with OT components require physical presence and can’t be done remotely – which is a difference to a lot of IT environments.