Would you recognize?
📸 How good are you at recognising AI-generated people?
❓ Would you be sceptical if the person tried to connect with you on LinkedIn, for example?
You can test yourself on these two sites:
📸 How good are you at recognising AI-generated people?
❓ Would you be sceptical if the person tried to connect with you on LinkedIn, for example?
You can test yourself on these two sites:
Since February 2022, cybersecurity threats to railways in the European Union have changed fundamentally: nation-state actors are no longer a theoretical possibility, but a dangerous reality. Russia is trying to sabotage European railways, warns Prague 💡 We therefore need to increase the resilience of the railway system against attacks by very capable attackers with access…
Critical infrastructure faces a growing number of security threats.. Critical infrastructure typically relies on Industrial Automation and Control Systems (IACS) and other non-IT components, often referred to as “Operational Technology.” To effectively assess cybersecurity risks within operational technology (OT) systems, adhering to the internationally recognized IEC 62443 standard is best practice. IEC 62443-3-2, part of…
Are you already registered for the English edition of our ICS – Informatik Consulting Systems webinar tomorrow? 📣 I’ll be talking about the topic “Security lifecycle management for existing ETCS products”. If you’re not yet registered, I’m inviting you to register today and dial in tomorrow! https://think-ics.com/aktuelles/events/webinar-security-management-webinar-railsystems/
Christmas season is here again! Like you, your “favorite” cyber criminals are also waiting to get their presents. Here are my 3 free security tips for you to spoil their fun this Christmas season: Have a wonderful time with your beloved ones and stay secure!
Step 1: Plan Security Management: This is the first step in the process, indicating the importance of planning and managing security measures effectively. Step 2: Security Risk Analysis (IEC 62443-3-2): The second step involves conducting a security risk analysis in accordance with the IEC 62443-3-2 standard. This step is crucial for identifying potential security risks…
Food for thought on the public holiday in Germany: What is defense in depth and why should you consider it?