IT/IoT attacks in 2022
OT / IoT attacks and supply chain attacks are considered as 2 of the 10 most “hot trends” in cybersecurity 2022.
OT / IoT attacks and supply chain attacks are considered as 2 of the 10 most “hot trends” in cybersecurity 2022.
Critical infrastructure faces a growing number of security threats.. Critical infrastructure typically relies on Industrial Automation and Control Systems (IACS) and other non-IT components, often referred to as “Operational Technology.” To effectively assess cybersecurity risks within operational technology (OT) systems, adhering to the internationally recognized IEC 62443 standard is best practice. IEC 62443-3-2, part of…
Step 1: Plan Security Management: This is the first step in the process, indicating the importance of planning and managing security measures effectively. Step 2: Security Risk Analysis (IEC 62443-3-2): The second step involves conducting a security risk analysis in accordance with the IEC 62443-3-2 standard. This step is crucial for identifying potential security risks…
Food for thought on the public holiday in Germany: What is defense in depth and why should you consider it?
The German Federal Office for Information Security (BSI) informs about a wave of DDoS attacks against websites of mainly airports as well as from the financial sector and the government, which happened last week. Post of BSI on LinkedIn
Be careful, what you post in your social media profile! Unfortunately, this is valuable input for a potential attacker. Especially the layout of the ID is interesting, in this case even with a valid ID… 🙁 In best case, the processes are designed in a way, that only this information will not lead to anything…
Real time AI applications can bring huge benefits but also come with (social) risks we will have to deal with. The example below is a good demonstration of what is possible today. I’m very curious regarding the public discussion on how we will balance benefits vs. risks of such applications without killing technological progress in…