Document classification
Do you classify your documents? Here’s what you should consider!
Do you classify your documents? Here’s what you should consider!
Step 1: Plan Security Management: This is the first step in the process, indicating the importance of planning and managing security measures effectively. Step 2: Security Risk Analysis (IEC 62443-3-2): The second step involves conducting a security risk analysis in accordance with the IEC 62443-3-2 standard. This step is crucial for identifying potential security risks…
This was my start into the new week this morning! 🌞🚴 This week I’m at one of our customers laboratories. Certain tests with OT components require physical presence and can’t be done remotely – which is a difference to a lot of IT environments.
The German BSI (Federal Office for Information Security) and TÜV-Verband conducted a survey among German companies to assess the status of cybersecurity in the private sector. Some worrying results from my point of view are: 🌐 Link to the study: BSI – Presse – TÜV-Studie zur Cybersicherheit der deutschen Wirtschaft: Bedrohungslage steigt, Unternehmen wiegen sich…
Cables for GSM-R were intentionally cut this morning in northern Germany. This is a very serious incident and has to be carefully investigated with regard to the motivation of the attackers. Link to article of German newspaper “Die Zeit” (08.10.2022)
New MS Exchange zero-day: https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2022/2022-258168-1032.html
Real time AI applications can bring huge benefits but also come with (social) risks we will have to deal with. The example below is a good demonstration of what is possible today. I’m very curious regarding the public discussion on how we will balance benefits vs. risks of such applications without killing technological progress in…