Social Engineering: Errors in Human Mind?

Author: Jens-Michael Marohn Social Engineering is a method to manipulate people into doing something or divulge confidential information. It could be seen as the hacking of the human mind. Compared to for example software, the human mind has far more vulnerabilities and it is significantly simpler to find and exploit these vulnerabilities since it does not require any special expertise like code or computer language. To become aware and protect ourselves against it, we need to look at the psychology and methods used by Social…

Making Use of Data in Manufacturing

I guess by now most people have fully understood the value of data driven decisions and are looking to find the right entry point, i.e. the right initial use cases to dip their toes into the data lake before really getting feet wet. One of the questions coming up quite often in customer discussions is how to start. Maybe the following can help some of you to find those initial use cases. Please keep in mind: IoT / Smart Manufacturing / Industry 4.0 etc. is…

Driving the Digital Vehicle

It’s not just central locking systems, power mirrors or the 18 electromechanical actuators one German luxury car had built into the driver’s seat as early as 1985 – the majority of vehicle processes have been managed electrically/electronically for decades. While today E/E components make up 20% to 40% of manufacturing costs of a car, this proportion is expected to rise to at least 50% in the years to come. This is not just due to the fact that the vehicles’ internal control mechanisms are becoming…

Security As A Service: Do You Get the Service You Expected? (Part 2/2)

Following the first article about why organizations should outsource security services, in this post I would like to address some further considerations. Adding external IT service providers to your company’s IT service portfolio requires a lot more considerations and arrangements.  It is not the intension of this article to be comprehensive in this regards, because many aspects are outside the information security scope.   Therefore the below covers just a few more but important action items when searching for a new security service provider.

Security As A Service: Do You Get the Service You Expected? (Part 1/2)

This article takes you on a comprehensive tour de force of Managed Security Services (MSS). Learn why organizations outsource security services, how they select providers, how the two sides work together and where the pitfalls are even when all necessary steps were taken to ensure a successful project/service.

Copyright 2017 21st CENTURY IT · RSS Feed · Anmelden