Defense in Depth
Food for thought on the public holiday in Germany: What is defense in depth and why should you consider it?
Food for thought on the public holiday in Germany: What is defense in depth and why should you consider it?
A big “Thank you” to all participants for attending the German edition of our ICS – Informatik Consulting Systems webinar today! I’m very happy, that so many people were interested in the topic “Security lifecycle management for existing ETCS products”. 📣 In case you’ve missed it or you’re not speaking German – don’t worry! There…
Despite the Easter holidays, a lot of incredible work was done over the weekend by many researchers analysing the details of the xz-utils backdoor. Some examples are: As the situation unfolds, it is becoming clear that this was not just one of the most sophisticated technical (perhaps the most sophisticated) attempts to introduce a backdoor…
Here are some questions to ask! Of course this is not the full list of questions, since your environment has to be known to choose the corresponding countermeasures.
📸 How good are you at recognising AI-generated people? ❓ Would you be sceptical if the person tried to connect with you on LinkedIn, for example? You can test yourself on these two sites: 🌐 Which Face Is Real?🌐 thispersondoesnotexist.com
Identity is the new perimeter. What does this mean in times of AI – both on the offensive and the defensive side? 💡 Rohit Ghai talks about this in an inspiring keynote at RSA Conference 2023. Well worth watching! https://www.youtube.com/watch?v=plMlFAxHJ6s
This month I’ve earned the Information Security Risk Manager. ISO/IEC 27005 certification of rigcert.education. Having multiple years of experience in managing security risks in OT environments according to IEC 62443-3-2, the ISO 27005 provides an extended perspective on risk management. Effective information security risk management is crucial for maintaining secure systems. Failing to properly assess…