The risk of cyber attacks on cars is increasing. The United Nations is responding with new regulations that will soon have to be implemented. Companies that do not meet the requirements will no longer be able to sell their vehicle types and parts. They could also face claims for damages and damage to their image, warns commercial lawyer Thorsten Deeg.
"Companies that do not comply with the new requirements on cybersecurity and software updates once they become mandatory may in future be prohibited from approving and therefore also selling new vehicle types and vehicle parts by the competent authority. In addition, vehicle manufacturers and suppliers may also face civil law consequences such as warranty and compensation claims from customers and/or third parties..." – Tagesspiegel
The risk of cyber attacks on cars is increasing. The United Nations is responding with new regulations that will soon have to be implemented. Companies that do not meet the requirements will no longe…
Overview of the IT Security Act and framework conditions for critical infrastructures
"Critical infrastructures - Find out in the following article what effects the IT Security Act has, which companies are affected and which security requirements they have to fulfill." - www.sichere-industrie.de
Overview of the IT Security Act and framework conditions for critical infrastructures
"Critical infrastructures - Find out in the following article what effects the IT Security Act has, which companie…
Using existing remote maintenance access as the basis for new services in mechanical engineering
"Remote maintenance is a common practice in mechanical and plant engineering. For Industry 4.0 services, it is both a curse and a blessing. On the one hand, you are "already in", but on the other, the connection may not be designed to meet the new requirements." - www.sichere-industrie.de
Using existing remote maintenance access as the basis for new services in mechanical engineering
"Remote maintenance is a common practice in mechanical and plant engineering. For Industry 4.0 services…
Which safety aspects need to be considered in a retrofit project
"When purchasing new machines and systems, it is not a particular challenge to take modern technologies and features into account. On the contrary, this is usually the basis for investment decisions in new products that replace older generations and models." - www.sichere-industrie.de
Which safety aspects need to be considered in a retrofit project
"When purchasing new machines and systems, it is not a particular challenge to take modern technologies and features into account. On t…
Security assessment of Industry 4.0 services in mechanical engineering
"The mechanical engineering industry is desperately looking for approaches and solutions to establish a new/second mainstay through the digitalization and networking of systems and machines. The IT security of the applications should be taken into account from the outset. Find out the 4 most important challenges here!" - www.sichere-industrie.de
Security assessment of Industry 4.0 services in mechanical engineering
"The mechanical engineering industry is desperately looking for approaches and solutions to establish a new/second mainstay throu…
Protective measures to protect an installation against infection by an encryption Trojan
"Technology is both part of the problem and part of the solution. People who use and operate IT and operational processes that are used for IT/OT operations are equally important when it comes to security in IT and OT. Even the most secure technology only provides limited protection against attacks from cyberspace if it is not used (governance) or users circumvent it (compliance).
Protective measures to protect an installation against infection by an encryption Trojan
"Technology is both part of the problem and part of the solution. People who use and operate IT and operational…
Awareness measures for plant personnel
"According to estimates, 97% of attacks are "social engineering", which means that the most frequently used gateway is by far human in nature. For example, users are persuaded to click on a link or open an attachment in an email. The remaining 3% use remotely exploitable vulnerabilities ("remote exploit"), for which no human interaction is required." - www.sichere-industrie.de
Awareness measures for plant personnel
"According to estimates, 97% of attacks are "social engineering", which means that the most frequently used gateway is by far human in nature. For example, users…
An overview of the ENISA organization and the EU Cybersecurity Act
"The EU Cybersecurity Act was adopted by the EU on April 17, 2019. The German version of the regulation can be found here. The aim is to create EU-wide regulations in the future that standardize and strengthen security throughout the EU. Specifically, it concerns so-called information and communication technology (ICT) systems, services and processes, which are increasingly finding their way into all areas of public and private everyday life as part of digitalization.
In the following paragraphs, we summarize who is behind the regulations and what possible effects the upcoming certification schemes will have on the industry." - www.sichere-industrie.de
An overview of the ENISA organization and the EU Cybersecurity Act
"The EU Cybersecurity Act was adopted by the EU on April 17, 2019. The German version of the regulation can be found here. The aim is…