How phishing resistant authentication can secure critical infrastructure from cyber threats
In my new blog post, I examine the critical infrastructure sector. This sector is becoming an increasingly common target of […]
In my new blog post, I examine the critical infrastructure sector. This sector is becoming an increasingly common target of […]
At the recent Embedded World trade fair in Nuremberg, it was one of the most discussed topics: the EU’s Cyber Resilience
The evolution of servers and data centers has fundamentally changed the way businesses operate. As efficiency and data processing capabilities
In my first blog post, I will explore why it is advantageous for companies to consider physical and logical access
In my first blog post, I provide a definitive analysis of the factors that enable certain SD and microSD cards
An Adversary-in-the-Middle (AitM) phishing attack is an advanced form of credential theft in which attackers insert themselves between a user
Industrial automation and robotics have fundamentally changed production. While efficiency and productivity are increasing, the requirements for reliable and robust
Businesses need to protect access to restricted areas just as they need to protect access to endpoint devices and sensitive
In my latest blog post, I focus on the cyber security of embedded systems and the associated special requirements. In
In my new blog post, I delved into the topic of edge servers and explored the unique demands they place