Is your OT-to-cloud connection secure?
Here are some questions to ask! Of course this is not the full list of questions, since your environment has to be known to choose the corresponding countermeasures.
Here are some questions to ask! Of course this is not the full list of questions, since your environment has to be known to choose the corresponding countermeasures.
Identity is the new perimeter. What does this mean in times of AI – both on the offensive and the defensive side? π‘ Rohit Ghai talks about this in an inspiring keynote at RSA Conference 2023. Well worth watching! https://www.youtube.com/watch?v=plMlFAxHJ6s
What a good start into the weekend π π The German BSI has published a guideline for developers regarding potential vulnerabilies in AI systems. π£ From my point of view, a security risk assessment on systems using AI technologies has to consider the attacks on the AI parts of the system as well. A security…
The beauty of a business trip to Vienna by night train: The possibility to fall asleep watching a wonderful sunset while driving through the Swabian Alb.
Cybersecurity in public transport: The operator of Hannover’s public transport was hacked. According to the linked article, it seems to be a ransomware attack. Bus and railway operation are not affected, but different systems such as the displays at the stations or the ticketing platform for the new “Deutschlandticket”. https://www.csoonline.com/de/a/cyberattacke-auf-hannoversche-verkehrsbetriebe,3674537
Real time AI applications can bring huge benefits but also come with (social) risks we will have to deal with. The example below is a good demonstration of what is possible today. I’m very curious regarding the public discussion on how we will balance benefits vs. risks of such applications without killing technological progress in…
What are the emerging cybersecurity threats for 2030? ENISA risks a glimpse into our future… ENISA Foresight Cybersecurity Threats for 2030 | ENISA Be aware that supply chain attacks are on their way to becoming the number 1 threat, according to ENISA. From my point of view, this topic is currently underestimated and we might…
A Military-Type Explosive Sent Via USB Drive (gbhackers.com) β‘ So far, USB-Killer devices were used by attackers (or pentesters) to disable or destroy devices with USB interfaces by discharging a high power electrical shock into the data lines of the USB port. β If you find a USB stick somewhere: Do not plug it into…
Voice and video as a means of identification can no longer be considered as secure! Let me predict, that the threat of impersonation through deepfakes and AI generated content will be one of the next big things. They will be used for fraudulent activities or for attempts to manipulate the public opinion. We need new…