WEAPONIZING PLCS Programmable logic controllers (PLCs) are indispensable industrial devices that control manufacturing processes in every critical infrastructure sector. Because of their position within automation, threat...
Day: September 29, 2024
EU AI Act – EU 2024/1689
Controls Checklist Mapping compliance requirements to controls is a lengthy and time-consuming task. This document presents a Proof of Concept (PoC) exploring the potential of Artificial...
EUROPEAN CYBERSECURITY SKILLS FRAMEWORK (ECSF)
The European Cybersecurity Skills Framework (ECSF) aims to establish a comprehensive structure for defining roles, responsibilities, and competencies in the field of cybersecurity. It provides a...
Enterprise Information Security
In today’s digital age, it is more important than ever for businesses to protect their sensitive data and systems from potential threats and breaches. This book...
REMOTE IDPROOFING GOOD PRACTICES
The purpose of this study is to build upon previous ENISA studies on RIDP and focus on new developments, security recommendations and good practices, when RIDP...
ENCRYPTION,HASHING AND DIGITAL SIGNATURE
Encryption is the process of converting plaintext or data into a ciphertext using an algorithm and a key. This process makes the original data unreadable to...
ENCRYPTED REVERSE
Shell for Pentester What is a Reverse Shell? Reverse Shell is a term we regularly hear in our industry, but when it comes to definition, it...
Email Phishing Playbook
The document outlines a structured approach to addressing phishing threats that jeopardize organizational security and increase the risk of data breaches. Views: 18
El estado de la seguridad informática en Alemania en 2023
La Oficina Federal de Seguridad de la Información (BSI), como autoridad federal de ciberseguridad, supervisa continuamente el panorama de amenazas a la seguridad informática en Alemania....