Would you recognize?
📸 How good are you at recognising AI-generated people?
❓ Would you be sceptical if the person tried to connect with you on LinkedIn, for example?
You can test yourself on these two sites:
📸 How good are you at recognising AI-generated people?
❓ Would you be sceptical if the person tried to connect with you on LinkedIn, for example?
You can test yourself on these two sites:
Maximilian Hedrich – Post | LinkedIn An example of what AI already is able to deliver today. We will need to deal with the issue of authenticity of voice and video in a AI driven future in a different way, than we did up to now. It’s not a question of “Will this technology be…
Today I attended the CNA e.V. railway technology forum 2024 in Nuremberg for ICS GmbH. The title of the conference was “Unlocking the opportunities of railtech”, which is both necessary and possible with the help of digital systems such as ETCS, ATO and CTMS – if it’s done in the right way. Cybersecurity plays a vital role in…
This month I’ve earned the ISO/IEC 42001:2023. Artificial intelligence management system practitioner certification of rigcert.education. As AI systems become widely integrated into the business world, securely managing them is increasingly critical. How can organizations ensure the reliability of AI outputs, protect company data from loss, and maintain system availability? These topics—and many others—are addressed by…
Critical infrastructure faces a growing number of security threats.. Critical infrastructure typically relies on Industrial Automation and Control Systems (IACS) and other non-IT components, often referred to as “Operational Technology.” To effectively assess cybersecurity risks within operational technology (OT) systems, adhering to the internationally recognized IEC 62443 standard is best practice. IEC 62443-3-2, part of…
Christmas season is here again! Like you, your “favorite” cyber criminals are also waiting to get their presents. Here are my 3 free security tips for you to spoil their fun this Christmas season: Have a wonderful time with your beloved ones and stay secure!
A new hashtag#attack technique on the rise: 2FA phishing.Learn how it works: How do attackers try to get around multi-factor authentication? https://www.microsoft.com/en-us/security/blog/2022/07/12/from-cookie-theft-to-bec-attackers-use-aitm-phishing-sites-as-entry-point-to-further-financial-fraud