Two-factor authentication
Start to annoy hackers today by using two-factor authentication (2FA)! Setting up 2-Step Verification (2SV) – NCSC.GOV.UK
Start to annoy hackers today by using two-factor authentication (2FA)! Setting up 2-Step Verification (2SV) – NCSC.GOV.UK
An attack on the software build pipeline can to some degree be compared to an attack on your supply chain. Your code can be 100% reviewed, but still the end product will contain malicious code – a very dangerous situation. Defending software build pipelines from malicious attack – NCSC.GOV.UK
We need to increase the amount of freight transported by rail massively. This will help us to achieve our sustainability goals, which we need to follow to prevent the worst consequences of climate change world wide. European rail freight transformation | McKinsey
Besides a nice impression of the driver’s perspective on this route, this video also illustrates, why the sophisticated railway signalling and train protection systems are essential for safe train operation independent from weather conditions. Technical measures ensure, that the track ahead is not occupied by another train and therefore also without good visibility conditions, high…
The German Cyber Security Agency BSI will host its yearly conference this week. Post | LinkedIn
OT / IoT attacks and supply chain attacks are considered as 2 of the 10 most “hot trends” in cybersecurity 2022. 6 hot cybersecurity trends — and 2 going cold | CSO Online
A solution for tracks only partly equipped with overhead lines: In Germany the first battery powered train is now operating with passengers. Batteries are being charged at those parts of the route, where an overhead line is installed.
Sometimes a small piece of metal makes the difference between being off track or being on track… 😉 Post | LinkedIn
Team spirit in times of Covid? Yes, for sure at ICS! Post | LinkedIn
A short excerpt from my pitch on ‘Security for Safety’ as part of the BW-International Session at it-sa 2021 is available here: Post | LinkedIn