Document classification
Do you classify your documents? Here’s what you should consider!
Do you classify your documents? Here’s what you should consider!
What are the emerging cybersecurity threats for 2030? ENISA risks a glimpse into our future… ENISA Foresight Cybersecurity Threats for 2030 | ENISA Be aware that supply chain attacks are on their way to becoming the number 1 threat, according to ENISA. From my point of view, this topic is currently underestimated and we might…
Most CRA conversations I have right now orbit around December 2027. That’s the wrong date to focus on first. Article 14 of the CRA – the reporting obligation for actively exploited vulnerabilities and severe incidents – applies from 11.09.2026. That’s roughly 5 months from now. And 15 months before the rest of the regulation kicks…
There was an interesting article published about Bing’s AI chat bot using a LLM (Large Language Model) this weekend in the New York Times. A clear recommendation for reading:Why a Conversation With Bing’s Chatbot Left Me Deeply Unsettled – The New York Times
Food for thought on the public holiday in Germany: What is defense in depth and why should you consider it?
This is actually a very interesting attack vector described in this post:As an attacker place a Google Ad for a keyword, which will be mapped to accidentally pasted unprotected Dropbox links (I’m sure, this will also work with other cloud providers) and see what you will get… LinkedIn Post
Identity is the new perimeter. What does this mean in times of AI – both on the offensive and the defensive side? 💡 Rohit Ghai talks about this in an inspiring keynote at RSA Conference 2023. Well worth watching! https://www.youtube.com/watch?v=plMlFAxHJ6s