Certificate Housekeeping

Nearly every application software brings a number of certificates with it. If you ask long-term IT security experts, they typically estimate that between 30 to 3,000 certificates are installed on any given PC. In reality a standard Windows 8.1 system easily has 30,000 and more certificates. MacOS 10.6 contains 2,000 certificates. Even on a Linux system (e.g. UBUNTU 14) there are 800 certificates. Unfortunately, lots of these certificates are outdated, are provided by untrustworthy issuers or use weak cryptography. Some certificates were generated a decade…

Securing your Quantified Self

One can look at the Internet of Things in a way where sensors are embedded in the physical world, e.g. plant sites, offices, homes or humans. Sensors embedded in the physical world of  humans are also known as wearables. Wearables such as fitness trackers and the like are an important component of the Quantified Self . But wearables are more; they also include  items like smart watches and smart eyewear. Gartner expects a strong growth in the wearable market in 2015, rising 38% from 2014.

The Weakest Link in Security: The Individual

Many industrial companies have a general rule like: all information that one can obtain during work or for work is confidential or highly confidential unless that information has been published by the communication department to the outside world. It should be every employee’s concern to protect the company’s confidential and sensitive information, this includes technology, know-how, strategy and intellectual property.

Similar but not the Same – Security for Industrial Control Systems vs. IT Systems

Today, industrial control systems (ICS) are at the center of monitoring and controlling industrial processes and operations such as production and delivery in the manufacturing sector, distribution of energy, water treatment, or managing railway transportation.

10 Steps to Survive a Data Breach (Part 2/2)

“An ounce of prevention is better than a pound of cure.” In line with this idiom, we discussed the prevention of a data breach in last week’s article. These measures are minimum prerequisites to reduce risk exposure and allow early detection. However, recent cyber-incidents have proven that breaches can happen to anyone and accordingly the following measures will help you deal with the situation effectively.

Copyright 2015 21st CENTURY IT · RSS Feed · Anmelden