Fraunhofer-Institut für Sichere Informationstechnologie SIT
Stories about Kriminalität
- more
Financial sector should perform penetration tests on its own according to EU regulation DORA
Financial sector should perform penetration tests on its own according to EU regulation DORA Banks under pressure to implement EU DORA regulation as quickly as possible Frankfurt, May 4 2023 – In 2022, the weekly number of cyberattacks in the financial industry averaged 1,131 attacks – a 52 percent increase in one year, according to Check Point Research figures. ...
more- 2
TXOne Networks Widens the Scope of Network Protection for OT Environments with Launch of New Product EdgeIPS 103
more Yanis Varoufakis brutally attacked by a group of thugs in Athens
One documentmore- 2
Disruptions from Ransomware and Cyberattacks on Supply Chains and Critical Infrastructure Sharpen Focus on OT Security for 2023, TXOne Networks and Frost & Sullivan Analysis Reveals
more - 3
EU Directive NIS 2 in Force: Companies Under Pressure on Cybersecurity
more Corruption jeopardizes implementation of sustainable policies in OECD and EU countries
Gütersloh (ots) - Recent findings from the Bertelsmann Stiftung's Sustainable Governance Indicators (SGI) show 14 out of 41 OECD and EU countries faltering at corruption prevention. UK ranks 14th in the overall ranking on corruption prevention. From 2012 to 2016, the average score for the indicator assessing corruption prevention efforts improved in OECD and EU ...
moreEU Cyber Resilience Regulation could mean Millions in Fines for Manufacturers, Distributors and Importers
EU Cyber Resilience Regulation could mean Millions in Fines for Manufacturers, Distributors and Importers IoT-Security provider ONEKEY offers quick compliance check for Cyber Resilience Act readiness Düsseldorf/Germany, January 18, 2023 – The EU Commission's Cyber Resilience Act (CRA) is intended to close the ...
moreONEKEY: New Release of Cybersecurity Software finds the most dangerous IoT Vulnerabilities
ONEKEY: New Release of Cybersecurity Software finds the most dangerous IoT Vulnerabilities Upgrading in the war against cybercriminals with expanded protection from zero-day attacks Düsseldorf/Germany, December 8, 2022 – ONEKEY, a company specializing in the security of industrial control systems and IoT devices, is responding to the increasing activity of criminal ...
moreTechnische Universität München
Companies report data leaks on heavy news days
TECHNICAL UNIVERSITY OF MUNICHCorporate Communications Center phone: +49 89 289 22798 - email: presse@tum.de - web: www.tum.de NEWS RELEASE Companies report data leaks on heavy news days Enterprises try to limit attention for losses of sensitive data Many companies carefully time disclosures on losses of sensitive customer data. A new study based on publicly traded US companies shows that companies tend to announce data ...
moreImporters and distributors are considered manufacturers: EU Cyber Resilience Act raises stakes
Importers and distributors are considered manufacturers: EU Cyber Resilience Act raises stakes OEM products become a cyber risk for chain stores, buying cooperatives and many more Düsseldorf/Germany, October 24, 2022 – The Cyber Resilience Act aims to close gaps in cybersecurity across the entire supply chain of products and protect consumers and companies from ...
moreFraunhofer-Institut für Sichere Informationstechnologie SIT
Document protection with colorful barcode / Simple forgery protection for paper documents and PDFs – automated tamper control via app
moreEU Cyber Resilience Act becomes a Tour de Force for the Industry
EU Cyber Resilience Act becomes a Tour de Force for the Industry Time-to-market becomes a gamble without automated analysis routines Düsseldorf/Germany, October 10, 2022 – All products with digital elements – from routers to smart refrigerators to televisions and, above all, any modern industrial equipment – should no longer pose cyber risks to users in the future. This is what the EU Commission is demanding, and ...
moreFraunhofer-Institut für Sichere Informationstechnologie SIT
Mechanism for Internet security broken
moreONEKEY announces automated detection of zero-day vulnerabilities
ONEKEY announces automated detection of zero-day vulnerabilities New platform for automated discovery of unknown 0-day vulnerabilities for producers of connected devices and operators of industrial control systems Düsseldorf/Germany, September 29, 2022 – For the first time, European IoT/OT security specialist ONEKEY is enabling software-based automated detection of ...
moreONEKEY is "Top Industrial IoT Solutions Provider in Europe"
ONEKEY is "Top Industrial IoT Solutions Provider in Europe" Leading US magazine selects German company as one of the top IoT security providers Düsseldorf/Germany, September 15, 2022 – Software "Made in Germany" also enjoys an excellent reputation in the USA: last year, the US magazine "Manufacturing Technology Insights" selected solutions provided by Siemens, Software AG and Cap Gemini as top class in the field of ...
moreExperts recommend: Managing Risks in the Software Supply Chain of Industrial Equipment & Products
Experts recommend: Managing Risks in the Software Supply Chain of Industrial Equipment & Products New expert whitepaper on managing risks in the software supply chain using IEC 62443 and automated software BOMs now available! Düsseldorf/Germany, September 7, 2022 – With a new cybersecurity agenda, the German government wants to improve the security of industrial ...
moreCybersecurity "Made in Germany": ONEKEY at Black Hat and DEF CON
Cybersecurity "Made in Germany": ONEKEY at Black Hat and DEF CON IoT security specialist ONEKEY presents new technology and tools at the two most important IT security conferences in 2022 Düsseldorf/Germany, July 18, 2022 – The two tech conferences Black Hat and DEF CON are considered the unofficial nerve center of global IT security. German companies are rather rarely allowed to present at these two events. This ...
moreAfter cake attack on Mona Lisa: Castello CUBE has to be hidden in a safe in the Swiss Alps!
moreStudy uncovers vulnerable IoT devices and facilities: Medical, manufacturing and CRITIS
Study uncovers vulnerable IoT devices and facilities: Medical, manufacturing and CRITIS IoT security report 2022 reveals significant gaps in cybersecurity Düsseldorf/Germany, July 6, 2022 – Cybersecurity is still thought of in silos – that is the conclusion of a study by IoT security specialist ONEKEY. "In many cases, companies and entrepreneurs still think in ...
moreDriveLock Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2022
Munich, Germany (ots) - DriveLock Wins in the Cutting Edge in Endpoint Security categoryat 10th Annual Global InfoSec Awards at #RSAC 2022. DriveLock is proud to announce we have won the following award(s) from CyberDefenseMagazine(CDM),theindustry’sleadingelectronicinformationsecuritymagazine: DriveLock SE has won the Cutting Edge in Endpoint Security award in the ...
moreIT study reveals glaring vulnerabilities: Industry must protect IoT controls
IT study reveals glaring vulnerabilities: Industry must protect IoT controls Industrial systems are moving into hackers' focus worldwide and pose enormous risks Düsseldorf/Germany, June 2, 2022 – With the increasing use of intelligent machines integrated into an entire manufacturing network, the risk of hacker attacks is rising enormously. An IT study reveals that ...
moreHawk AI appoints FinCrime veteran Steve Liu as General Manager for the USA
Munich/San Francisco (ots) - Hawk AI, a global leading software platform for banks, fintechs, and payment companies supporting the fight against financial crime and money laundering, is pleased to announce the appointment of AML/Fraud industry veteran Steve Liu as General Manager for the United States. In his role, Liu will be responsible for driving growth in the ...
moreIAPC Awards 2022 Democracy Medal to Ukrainian President Volodymyr Zelenskyy and The People of Ukraine
Washington, DC (ots) - --News Direct-- The International Association of Political Consultants (IAPC) announced today that it is awarding the prestigious 2022 Democracy Medal to the President of Ukraine, Volodymyr Zelenskyy on behalf of the Ukrainian people. The citation notes that this award is “in recognition of ...
moreIoT Inspector becomes ONEKEY – The Central Platform for Automated IIoT/OT Security and Compliance
IoT Inspector becomes ONEKEY – The Central Platform for Automated IIoT/OT Security and Compliance New name underlines expanded focus for industry (IIoT), manufacturing (OT) and Internet of Things (IoT) Düsseldorf/Germany, May 3, 2022 – German IT security company IoT Inspector is giving itself a new name. The specialist team for automated analysis of IoT devices ...
moreImage Analyzer Extends Technology Partnership with OpenText
London (ots) - --News Direct-- Image Analyzer, vendor of award-winning visual threat recognition technology, has announced an extended Technology Supply Agreement with OpenText™, a global leader in Information Management and leading provider of digital forensic software. Under the terms of the agreement, OpenText has integrated Image Analyzer Visual Intelligence System (IAVIS) into its OpenText™ Magellan™ Risk Guard ...
moreComodo and Distilogix Partner to Deliver Zero Trust Endpoint Protection to Enterprises in the Middle East, Africa and the Eastern European Region
Bloomfield, NJ (ots) - --News Direct-- Comodo Security Solutions, a leading provider of endpoint protection, today announced that they have partnered withDistilogix Distribution to boost presence and better support enterprise customers in the Middle East, Africa, and the Eastern European region. Both companies are ...
more- 11
Telos' Decentralization Rivals that of Bitcoin and Ethereum
more The future of secure digital customer onboarding: With PXL Ident from fully automated identity verification to electronic signature
Berlin (ots) - ● The PXL Ident Software-as-a-Service solution now offers fully automated identity checks up to and including electronic signatures. ● The Swiss company digitises and automates the entire onboarding route as well as customer processes. ● Companies can minimise identity fraud and increase ...
moreDeutsches Institut für Menschenrechte
States must continue to offer protection to particularly vulnerable Afghans
Berlin (ots) - The German Institute for Human Rights strongly recommends that all states involved in the Afghanistan operation, including Germany, provide protection to local staff and particularly vulnerable Afghans. Using Germany as an example, the recently published publication "Responsibility for basic and human rights following the withdrawal from Afghanistan“ ...
more