News

05.01.2021 09:30
Article

The risk of cyber attacks on cars is increasing. The United Nations is responding with new regulations that will soon have to be implemented. Companies that do not meet the requirements will no longer be able to sell their vehicle types and parts. They could also face claims for damages and damage to their image, warns commercial lawyer Thorsten Deeg.

"Companies that do not comply with the new requirements on cybersecurity and software updates once they become mandatory may in future be prohibited from approving and therefore also selling new vehicle types and vehicle parts by the competent authority. In addition, vehicle manufacturers and suppliers may also face civil law consequences such as warranty and compensation claims from customers and/or third parties..." – Tagesspiegel

The risk of cyber attacks on cars is increasing. The United Nations is responding with new regulations that will soon have to be implemented. Companies that do not meet the requirements will no longe…

show more show less
10.12.2020 11:40
Article

Overview of the IT Security Act and framework conditions for critical infrastructures

"Critical infrastructures - Find out in the following article what effects the IT Security Act has, which companies are affected and which security requirements they have to fulfill." - www.sichere-industrie.de

Overview of the IT Security Act and framework conditions for critical infrastructures

"Critical infrastructures - Find out in the following article what effects the IT Security Act has, which companie…

show more show less
10.12.2020 11:30
Article

Using existing remote maintenance access as the basis for new services in mechanical engineering

"Remote maintenance is a common practice in mechanical and plant engineering. For Industry 4.0 services, it is both a curse and a blessing. On the one hand, you are "already in", but on the other, the connection may not be designed to meet the new requirements." - www.sichere-industrie.de

Using existing remote maintenance access as the basis for new services in mechanical engineering

"Remote maintenance is a common practice in mechanical and plant engineering. For Industry 4.0 services…

show more show less
10.12.2020 11:25
Article

Which safety aspects need to be considered in a retrofit project

"When purchasing new machines and systems, it is not a particular challenge to take modern technologies and features into account. On the contrary, this is usually the basis for investment decisions in new products that replace older generations and models." - www.sichere-industrie.de

Which safety aspects need to be considered in a retrofit project

"When purchasing new machines and systems, it is not a particular challenge to take modern technologies and features into account. On t…

show more show less
10.12.2020 11:21
Article

Security assessment of Industry 4.0 services in mechanical engineering

"The mechanical engineering industry is desperately looking for approaches and solutions to establish a new/second mainstay through the digitalization and networking of systems and machines. The IT security of the applications should be taken into account from the outset. Find out the 4 most important challenges here!" - www.sichere-industrie.de

Security assessment of Industry 4.0 services in mechanical engineering

"The mechanical engineering industry is desperately looking for approaches and solutions to establish a new/second mainstay throu…

show more show less
26.11.2020 14:00
Article

Protective measures to protect an installation against infection by an encryption Trojan

"Technology is both part of the problem and part of the solution. People who use and operate IT and operational processes that are used for IT/OT operations are equally important when it comes to security in IT and OT. Even the most secure technology only provides limited protection against attacks from cyberspace if it is not used (governance) or users circumvent it (compliance).

Protective measures to protect an installation against infection by an encryption Trojan

"Technology is both part of the problem and part of the solution. People who use and operate IT and operational…

show more show less
25.11.2020 12:00
Article

Awareness measures for plant personnel

"According to estimates, 97% of attacks are "social engineering", which means that the most frequently used gateway is by far human in nature. For example, users are persuaded to click on a link or open an attachment in an email. The remaining 3% use remotely exploitable vulnerabilities ("remote exploit"), for which no human interaction is required." - www.sichere-industrie.de

Awareness measures for plant personnel

"According to estimates, 97% of attacks are "social engineering", which means that the most frequently used gateway is by far human in nature. For example, users…

show more show less
25.11.2020 11:30
Article

An overview of the ENISA organization and the EU Cybersecurity Act

"The EU Cybersecurity Act was adopted by the EU on April 17, 2019. The German version of the regulation can be found here. The aim is to create EU-wide regulations in the future that standardize and strengthen security throughout the EU. Specifically, it concerns so-called information and communication technology (ICT) systems, services and processes, which are increasingly finding their way into all areas of public and private everyday life as part of digitalization.

In the following paragraphs, we summarize who is behind the regulations and what possible effects the upcoming certification schemes will have on the industry." - www.sichere-industrie.de

An overview of the ENISA organization and the EU Cybersecurity Act

"The EU Cybersecurity Act was adopted by the EU on April 17, 2019. The German version of the regulation can be found here. The aim is…

show more show less