Is your OT-to-cloud connection secure?
Here are some questions to ask! Of course this is not the full list of questions, since your environment has to be known to choose the corresponding countermeasures.

Here are some questions to ask! Of course this is not the full list of questions, since your environment has to be known to choose the corresponding countermeasures.

This month I’ve earned the Information Security Risk Manager. ISO/IEC 27005 certification of rigcert.education. Having multiple years of experience in managing security risks in OT environments according to IEC 62443-3-2, the ISO 27005 provides an extended perspective on risk management. Effective information security risk management is crucial for maintaining secure systems. Failing to properly assess…
The German Federal Office for Information Security (BSI) informs about a wave of DDoS attacks against websites of mainly airports as well as from the financial sector and the government, which happened last week. Post of BSI on LinkedIn
What’s the state of your password security? Do you consider the length and complexity and don’t use the same password for multiple services? Post | LinkedIn
What is the role of us security professionals when it comes to AI powered systems?
Since the onset of the COVID-19 pandemic, the world has seen a significant shift towards remote working. This shift has led to an increase in virtual meetings and, as a result, the use of Bluetooth headsets for convenience. But one question arises – are these Bluetooth headsets secure? To understand the security of a typical…
What are the emerging cybersecurity threats for 2030? ENISA risks a glimpse into our future… ENISA Foresight Cybersecurity Threats for 2030 | ENISA Be aware that supply chain attacks are on their way to becoming the number 1 threat, according to ENISA. From my point of view, this topic is currently underestimated and we might…