DDoS attacks
The German Federal Office for Information Security (BSI) informs about a wave of DDoS attacks against websites of mainly airports as well as from the financial sector and the government, which happened last week.
The German Federal Office for Information Security (BSI) informs about a wave of DDoS attacks against websites of mainly airports as well as from the financial sector and the government, which happened last week.
The shifting political landscape in the United States may significantly impact the global IT industry, especially in Europe. This blog post explores three aspects of how Trump 2.0 could impact the IT sector in Europe, offering insights into the near future and potential developments ahead. Data Transfer to the US The foundation for the legal…
Currently a lot of standardization projects regarding the CRA are on-going. These standardization projects aim to develop harmonized European standards for the fundamental cybersecurity requirements of the CRA and the requirements regarding vulnerability management (horizontal standards) as well as different product categories (vertical standards). You can find an overview over the currently active standardization projects…
This month I’ve earned the Information Security Risk Manager. ISO/IEC 27005 certification of rigcert.education. Having multiple years of experience in managing security risks in OT environments according to IEC 62443-3-2, the ISO 27005 provides an extended perspective on risk management. Effective information security risk management is crucial for maintaining secure systems. Failing to properly assess…
We are already seeing real-world applications of artificial intelligence in the rail sector. Deutsche Bahn is using artificial intelligence to reduce delays on its network. My prediction: This is just the beginning of ML/AI applications in our sector. We will see machine learning and AI algorithms becoming more and more widespread in the coming years….
An attack on the software build pipeline can to some degree be compared to an attack on your supply chain. Your code can be 100% reviewed, but still the end product will contain malicious code – a very dangerous situation. Defending software build pipelines from malicious attack – NCSC.GOV.UK
Voice and video as a means of identification can no longer be considered as secure! Let me predict, that the threat of impersonation through deepfakes and AI generated content will be one of the next big things. They will be used for fraudulent activities or for attempts to manipulate the public opinion. We need new…