Is your OT-to-cloud connection secure?
Here are some questions to ask! Of course this is not the full list of questions, since your environment has to be known to choose the corresponding countermeasures.

Here are some questions to ask! Of course this is not the full list of questions, since your environment has to be known to choose the corresponding countermeasures.

Food for thought on the public holiday in Germany: What is defense in depth and why should you consider it?
German Federal Office For Information Security (BSI) now officially warns to use anti-virus software of the russian manuafacturer Kaspersky. BSI – FAQ – Kaspersky
Are you already registered for the English edition of our ICS – Informatik Consulting Systems webinar tomorrow? 📣 I’ll be talking about the topic “Security lifecycle management for existing ETCS products”. If you’re not yet registered, I’m inviting you to register today and dial in tomorrow! https://think-ics.com/aktuelles/events/webinar-security-management-webinar-railsystems/
This post is a great example, that a spear phishing attack also works in the offline world. It does not always have to be an e-mail! Thank you to Marc Torke for sharing this. The letter in the picture is claiming to come from an official German court and was sent to a newly founded…
What is the role of us security professionals when it comes to AI powered systems?
There was an interesting article published about Bing’s AI chat bot using a LLM (Large Language Model) this weekend in the New York Times. A clear recommendation for reading:Why a Conversation With Bing’s Chatbot Left Me Deeply Unsettled – The New York Times