Password security
What’s the state of your password security? Do you consider the length and complexity and don’t use the same password for multiple services?
What’s the state of your password security? Do you consider the length and complexity and don’t use the same password for multiple services?
A new hashtag#attack technique on the rise: 2FA phishing.Learn how it works: How do attackers try to get around multi-factor authentication? https://www.microsoft.com/en-us/security/blog/2022/07/12/from-cookie-theft-to-bec-attackers-use-aitm-phishing-sites-as-entry-point-to-further-financial-fraud
AI can track the time you spend on your phone during work. The post below shows an interesting demonstration of the technical capabilities. From my point of view, these kind of AI applications will be and should be a focus of a broad public discussion in the near future. AI applications will offer great opportunities,…
How well do you know your IT? Learn which questions to ask!
Step 1: Plan Security Management: This is the first step in the process, indicating the importance of planning and managing security measures effectively. Step 2: Security Risk Analysis (IEC 62443-3-2): The second step involves conducting a security risk analysis in accordance with the IEC 62443-3-2 standard. This step is crucial for identifying potential security risks…
What’s happening in the German security & AI startup sector? Tomorrow is the final of the “Deutscher Startup-Pokal” for the security and AI sector, organised by GFFT e.V.. I have been asked to be part of the jury for the security startups that will be pitching tomorrow: 💡 sematicon AG💡 Cybervize💡 ONEKEY Together with the…
Today I attended the CNA e.V. railway technology forum 2024 in Nuremberg for ICS GmbH. The title of the conference was “Unlocking the opportunities of railtech”, which is both necessary and possible with the help of digital systems such as ETCS, ATO and CTMS – if it’s done in the right way. Cybersecurity plays a vital role in…