Einloggen, um das vollständige Profil von Egon Kando zu sehen
oder
Bereits auf LinkedIn? Einloggen
Wenn Sie auf „Weiter“ klicken, um Mitglied zu werden oder sich einzuloggen, stimmen Sie der Nutzervereinbarung, der Datenschutzrichtlinie und der Cookie-Richtlinie von LinkedIn zu.
Einloggen, um das vollständige Profil von Egon Kando zu sehen
oder
Bereits auf LinkedIn? Einloggen
Wenn Sie auf „Weiter“ klicken, um Mitglied zu werden oder sich einzuloggen, stimmen Sie der Nutzervereinbarung, der Datenschutzrichtlinie und der Cookie-Richtlinie von LinkedIn zu.
Würzburg und Umgebung
Einloggen, um das vollständige Profil von Egon Kando zu sehen
Mit E-Mail-Adresse anmelden
oder
Bereits auf LinkedIn? Einloggen
Wenn Sie auf „Weiter“ klicken, um Mitglied zu werden oder sich einzuloggen, stimmen Sie der Nutzervereinbarung, der Datenschutzrichtlinie und der Cookie-Richtlinie von LinkedIn zu.
1669 Follower:innen
500+ Kontakte
Einloggen, um das vollständige Profil von Egon Kando zu sehen
oder
Bereits auf LinkedIn? Einloggen
Wenn Sie auf „Weiter“ klicken, um Mitglied zu werden oder sich einzuloggen, stimmen Sie der Nutzervereinbarung, der Datenschutzrichtlinie und der Cookie-Richtlinie von LinkedIn zu.
Gemeinsame Kontakte mit Egon Kando anzeigen
Mit E-Mail-Adresse anmelden
oder
Bereits auf LinkedIn? Einloggen
Wenn Sie auf „Weiter“ klicken, um Mitglied zu werden oder sich einzuloggen, stimmen Sie der Nutzervereinbarung, der Datenschutzrichtlinie und der Cookie-Richtlinie von LinkedIn zu.
Gemeinsame Kontakte mit Egon Kando anzeigen
oder
Bereits auf LinkedIn? Einloggen
Wenn Sie auf „Weiter“ klicken, um Mitglied zu werden oder sich einzuloggen, stimmen Sie der Nutzervereinbarung, der Datenschutzrichtlinie und der Cookie-Richtlinie von LinkedIn zu.
Einloggen, um das vollständige Profil von Egon Kando zu sehen
oder
Bereits auf LinkedIn? Einloggen
Wenn Sie auf „Weiter“ klicken, um Mitglied zu werden oder sich einzuloggen, stimmen Sie der Nutzervereinbarung, der Datenschutzrichtlinie und der Cookie-Richtlinie von LinkedIn zu.
Aktivitäten
1669 Follower:innen
-
Egon Kando hat dies repostetEgon Kando hat dies repostetAI agents are now part of the enterprise workforce. Powerful for productivity. Dangerous without visibility. That means security teams need to do two things at once: help the business use them confidently, and defend against the new risks they introduce. Today, Exabeam announced a major expansion of Agent Behavior Analytics to bring visibility into OpenAI ChatGPT and Microsoft Copilot, alongside Google Gemini, so teams can understand how AI agents behave, detect misuse earlier, and govern them like any other identity. Read the press release 👉 https://ow.ly/iKmK50YBxqv
-
Egon Kando hat dies repostetEgon Kando hat dies repostetIf AI access is gated behind add-ons, credits, or tiers, people stop using it. No security analyst wants to do budget math in the middle of work. That’s why we built AI into the New-Scale Platform: not as an add-on, not as a separate SKU, and not as a limited “trial mode.” Our goal is to make AI usable every day, at scale, without rationing. Learn about Exabeam Nova: https://ow.ly/BNs150YwpxK #AIDrivenSecurityOperations #AgenticAI #SecOps
-
Egon Kando hat dies geteiltAI agents are fueling Insider Threats, Compromised Credentials still remain attack vector #1. Meet me at RSAC to learn more about how to detect misbehavior of AI agents, use AI to automate investigation and increase SOC efficiency.
-
Egon Kando hat dies repostetEgon Kando hat dies repostet🏆 Best AI Security Solution. Secured. We’re beyond excited to share that Exabeam has won Best AI Security Solution at the UK teissAwards2026. In a highly competitive category, Exabeam stood out for delivering AI-powered security that detects, prevents, and resolves today’s most sophisticated cyberthreats. This win is a powerful acknowledgment of the innovation behind our AI, the impact we’re delivering for security teams every day, and the leadership we continue to demonstrate in the cybersecurity industry. Huge credit to our team pushing the boundaries of what AI in cybersecurity can do, and to our customers who trust us to protect what matters most. 🚀 Gary Read Julie Thomson Findlay Whitelaw Gemma Hamilton #Exabeam #teissAwards2026 #AISecurity #Cybersecurity #AILeadership #SecurityInnovation #ThreatDetection #CyberDefense
-
Egon Kando hat dies repostetEgon Kando hat dies repostetCybersecurity budgets are up and AI is the #1 investment priority. But here’s the twist: 👉 AI is also the first on the chopping block if budget tightens 👉 Boards are pushing for rapid AI-driven transformation 👉 Security leaders are being asked to prove measurable business value Decision-makers are balancing innovation with scrutiny, navigating vendor noise, and preparing for sharper budget conversations ahead. The organizations that get this right won’t just adopt AI — they’ll defend and operationalize it strategically. Our latest research breaks down where security investments are accelerating, where they’re exposed, and how leading teams are preparing for what’s next. If you’re shaping security strategy or defending AI spend in 2026 planning cycles, this is essential reading. Download the full report: https://ow.ly/SHo650YkYpH TEN18 by Exabeam: Steve Povolny, Stephen Moore, Findlay Whitelaw, Steve Wilson, Kevin Kirkwood, Gabrielle Hempel, Sally Vincent
-
Egon Kando hat dies repostetEgon Kando hat dies repostetAI agents will get their own employee badges in 2026, according to TEN18 by Exabeam Co-Founder, Steve Povolny. For some time, they’ve been working as assistive tools behind the scenes to help security teams find threats fast. However, with great power comes great responsibility, and AI agents can move laterally through systems unchecked. It’s time for organizations to secure them so attackers can’t take advantage. What are your thoughts on protecting AI agents? Write a comment below. 💬 #AgenticAI #AIDrivenSecurityOperations #CybersecurityTrends
-
Egon Kando hat dies repostetEgon Kando hat dies repostetAs organizations rapidly adopt AI agents for research, operations, and customer engagement, a new security challenge emerges. These agents act as "non-human insiders," with broad access to systems and data, creating risks that resemble insider threats. That’s why we created Exabeam Agent Behavior Analytics (ABA). ⬇️ #CyberSecurity #AI #ArtificialIntelligence #SIEM #UEBA #InsiderRisk #SecurityOperationsExabeam Agent Behavior Analytics: First-of-Its-Kind Behavioral Detections for AI AgentsExabeam Agent Behavior Analytics: First-of-Its-Kind Behavioral Detections for AI Agents
-
Egon Kando hat dies repostetEgon Kando hat dies repostetAI is powering unprecedented productivity, yet unsanctioned use of AI tools inside organizations is creating invisible risks that traditional security models aren’t prepared to handle. In my latest piece for TechRadar Pro, I explore how leaders can bring shadow AI into view, establish smart governance, and protect data and compliance without dampening innovation or experimentation. https://lnkd.in/gttCn_E8 TEN18 by Exabeam #ten18 #exabeam #shadowAIHow organizations can mitigate shadow AI without stifling innovationHow organizations can mitigate shadow AI without stifling innovation
-
Egon Kando hat dies geteiltI'm looking for a RSM in BENELUX. Check out this job posting and apply if you want to join one of the best companies in Cyber and the best team. https://lnkd.in/dKpzK8x8
-
Egon Kando gefällt dasEgon Kando gefällt dasCome hang with the cool kids at the Exabeam booth 4410 at #GoogleCloudNext
-
Egon Kando gefällt dasEgon Kando gefällt dasFive years ago today, Barry Shteiman and I made it official and started Radiant Security. But the decision had already been made long before we signed anything. Somewhere in the middle of watching sharp, experienced security teams spend their days triaging alerts, wondering how many real threats were hiding in the noise they didn't have time to investigate. I knew the problem intimately. I'd carried it as a CISO for years. What I didn't know was whether it could actually be solved. Luckily, Barry and Katie M. figured that part out and continue to innovate every day by building new technology that takes that dream even further. Thank you to our customers, partners, team, and early supporters. We wouldn't be here without you.
-
Egon Kando gefällt dasEgon Kando gefällt dasLeadership is a 24/7 Commitment... Earlier today, a critical support case was escalated by one of our customers. Despite it being a weekend morning for my CEO, Pete, I didn't hesitate to reach out to him, and he didn't hesitate for a single second to jump into action. Within minutes, Pete was rallying the right team members together to ensure the issue was addressed immediately. In the corporate world, many talk about being "customer-centric," but true leadership is defined by what happens when the cameras are off and the weekend has started. Seeing our CEO prioritize a customer’s success and brand reputation over his own personal time is exactly what inspires our team to go the extra mile every day. At Exabeam, our customers' voices aren't just heard—they are felt at every level of the organization. Thank you, Pete Harteveld, Ashok C., David Kennedy, and Mohammed Khidir, for leading by example and for being a true champion for our customers’ satisfaction. #Leadership #CustomerSuccess #CyberSecurity #Exabeam #CustomerFirst #ExecutiveLeadership #IMETA
-
Egon Kando gefällt dasEgon Kando gefällt das⏳ Less than a week to go! Our CEO, Ian Thomas, is excited to share what to expect from CyberUK in Glasgow and from our stand at C8 🎉 Join Sapphire alongside Exabeam, Halcyon, MXDR Ltd and SOCRadar® Extended Threat Intelligence to see how we are helping organisations build stronger cyber resilience with practical, real‑world security solutions that deliver immediate impact 🔐✨ 🔧 Live demo series not to be missed! There is plenty happening across both days, with live demos running throughout the event. 👉 Take a look at the full schedule here: https://lnkd.in/ewbRYWYK 👋 If you are heading to #CyberUK26, let us know and come and say hello at Stand C8. We would love to meet you. We cannot wait to see you there 👀✨ #Sapphire #Exabeam #Halcyon #MXDR #SOCRadar #CyberUK26 #LiveDemos
-
Egon Kando gefällt dasEgon Kando gefällt das✨ I’m beyond excited to share that I’ve joined One Workplace as Chief People Officer. ✨ As I’ve reflected on what matters most in both life and work, one theme keeps coming up: it’s the #people, the #culture, and what we build together that truly make the difference. That’s what drew me to One Workplace. This is a company that doesn’t just create physical spaces; we create environments where connection, creativity, and performance thrive. The opportunity to help shape a culture that enables people to do their best work and feel deeply connected while doing it is incredibly meaningful to me. Grateful to Dave Albert, the Ferrari family, Mona Heffernan, CPA, Brian Wilson, Kyle Haakenson, Audrey C. Meller, Kelly Steitz, Leigh Zils and others for the warm welcome. Also incredibly appreciative of the teams across California and Washington for such a thoughtful and beautiful introduction. I’ve felt it from day one. 🧡 Looking ahead, I’m excited for what’s to come and for the opportunity to build, grow, and have fun together. Here’s to magic! 🚀 And to my People & Places community, if you’re ever interested in seeing our spaces in action, I’d love to host you for a personal tour of one of our offices. We’re creating some truly special environments. 🤩
-
Egon Kando gefällt dasEgon Kando gefällt dasExcited to share that I’ve joined Horizon3.ai as Vice President, Sales – APJ. Thank you to Matt Hartley, Snehal Antani, Ellen Sundra, Andres Botero,Drew Mullen Tim Mackie & Holly Grey for the opportunity to build out the GTM plan together in APJ. All Gas No Drag we will build fast!!! I love the technology stack and the total addressable market. Horizon3.ai has built the first most experienced AI hacker to help organizations defend themselves at machine speed. Currently Horizon3.ai is helping over 5,200 organizations worldwide running 225K production-safe pentests for continuous assurance. Customers can gain real world value with Horizon3.ai through: Autonomous, continuous testing that safely attacks your environment the way a real adversary would, helping teams find and fix what matters most before it’s exploited. Prioritized, actionable remediation that shows exactly how issues are chained together and how to fix them, reducing noise and helping lean teams move faster. Broad coverage across hybrid environments (cloud, on-prem, and everything in between), giving a realistic view of your actual attack surface rather than just theoretical risk. I’m looking forward to working with customers and partners across the region to help them stay ahead of rapidly evolving threats and get more value from their security investments. If you’d like to compare notes on offensive security, continuous testing and where the market is heading, I’d love to chat, please email gareth.cox@horizon3.ai
-
Egon Kando gefällt dasEgon Kando gefällt dasAfter more than seven fantastic years at Exabeam, I am excited to embark on a new challenge and bring a fresh offensive security solution to market so stay tune. I want to express my sincere gratitude to Chris Cesio, whose mentorship and referral to my role were invaluable. My thanks also go to Nir Polak and Ralph Pisani for hiring me and trusting me to develop the GTM plan for APJ with my business partners over the years Mohamed Ibrahim, (CISSP), Ted Plumis, Ken Hammond, Holly Grey, Andy Skrei, Luke Voigt, Joanne Pei Lee W. and Chris Stewart. Together, we have built a robust APJ business and helped advance security innovation. Exabeam remains a truly valuable AI and ML security control, empowering companies to identify what is normal and what is abnormal. I am grateful to all the executives who visited the region to drive the business forward—Adam Geller, Michael DeCesare, Pedro Abreu, Warby Warburton, R R, Inna Shalom, Craig Patterson, and Steve Wilson. Stephen Moore, thank you for your exceptional dedication through more than ten trips into region; your insights greatly shaped my experience. I'd also like to thank the Exabeam teams, past and present, for your support and collaboration. Too many to tag. But please see some of the photos below. Pete Harteveld and Mike Byron are leading Exabeam with great vision, and the APJ business is in strong hands with over 45 staff continuing to support customers and partners. To everyone at Exabeam, your support made my journey unforgettable. I am eager to bring new solutions to market and continue learning in my next chapter. Wishing you all the best.
-
Egon Kando gefällt dasEgon Kando gefällt dasGehaltstransparenz: Einkaufsleiter → Titel: Head of Procurement → Branche: Einkauf / Produktmanagement / Industrie → Erfahrung: • ~10+ Jahre Berufserfahrung • Mehrjährige Führungsrollen (Head of / Team Lead) → Gehalt (Monat): • Fix: ca. 6.600 € • Bonus/Prämie im März: ca. 11.375 € (variabel) → Gesamtbrutto (März): ca. 18.150 € → Arbeitsmodell: Hybrid → Location: Deutschland (zuletzt NRW / Sachsen-Anhalt)
Erhaltene Empfehlungen
1 Person hat Egon Kando empfohlen
Jetzt anmelden und ansehenEgon Kandos vollständiges Profil ansehen
-
Herausfinden, welche gemeinsamen Kontakte Sie haben
-
Sich vorstellen lassen
-
Egon Kando direkt kontaktieren
Weitere Beiträge entdecken
-
Hendry Rahardja
1304 Follower:innen
Breisgau-Hochschwarzwald district admin deployed G DATA 365 MXDR for 24/7 IT security, covering 2,300 clients with automated containment and transparent incident handling, boosting compliance and easing limited security staffing. #ITOperations #ManagedDetection link: https://ift.tt/fAxPikn
-
Yew Kuann CHENG (YK)
PCI Security Standards Council • 4899 Follower:innen
𝗚𝗼𝗼𝗱 𝗲𝗺𝗮𝗶𝗹 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗿𝗲𝗺𝗶𝗻𝗱𝗲𝗿𝘀! Continuing my feature of sponsors of the upcoming PCI AP and Europe Community Meetings, thank you to the usd AG team for being a silver sponsor at the PCI EUCM and they will be sponsoring swags! https://lnkd.in/gXvJnNm5 There are a number of interesting articles on the usd AG blog. https://lnkd.in/g_sbr7Uz In their latest article “How to Strengthen Your Email Security: Insights from Our Pentesters” on 13 Aug 2025, they started: “Email security is a key factor in application development and system configuration. Vulnerabilities in this environment can lead to data leaks and facilitate phishing attacks.” - from usd AG. https://lnkd.in/ghHhNH22 Here are the email security tips by usd AG, which they have outlined for application development and system operations: 1. 𝘛𝘪𝘱𝘴 𝘧𝘰𝘳 𝘢𝘱𝘱𝘭𝘪𝘤𝘢𝘵𝘪𝘰𝘯 𝘥𝘦𝘷𝘦𝘭𝘰𝘱𝘮𝘦𝘯𝘵 - Proper encoding of user content - Immutable link target domains 2. 𝘛𝘪𝘱𝘴 𝘧𝘰𝘳 𝘴𝘺𝘴𝘵𝘦𝘮 𝘰𝘱𝘦𝘳𝘢𝘵𝘪𝘰𝘯𝘴 - Authenticated email sending only - Always encrypted communication In PCI DSS (Data Security Standard), there are various email security-related references. This includes anti-phishing requirements to have processes and automated mechanisms to detect and protect personnel against phishing attacks. PCI encourages entities to consider a combination of approaches when developing anti-phishing controls e.g. anti-spoofing controls like Domain-based Message Authentication, Reporting & Conformance (DMARC), Sender Policy Framework (SPF) and Domain Keys Identified Mail (DKIM). This will help prevent attackers from spoofing (pretending/mimicking) the entity’s domain and impersonating personnel. usd AG is a PCI GEAR (Global Executive Assessor Roundtable) member. Thanks for your support, Christopher Kristes, Torsten Schlotmann to represent the assessor community. Do share these ideas and tips at the GEAR meetings to continue improving PCI standards. Disclaimer: PCI Council is a neutral body and my personal post is not an endorsement of any organization or solution. PCI Security Standards Council #pcissc #pcicommunity #pcidss #pcidssv4 #datasecurity #cybersecurity #payments #paymentsecurity Video credit: Thank you Canva for your platform and the royalty-free video.
25
2 Kommentare -
Philip Scheidl
CrowdStrike • 1177 Follower:innen
Und wieder eine super spannende Podcast-Folge! 🎮 From griefers to ransomware gangs: SCATTERED SPIDER has respawned. In the latest episode of the Adversary Universe podcast, we trace how a crew that started their antics in Minecraft servers evolved into one of the most notorious cybercriminal groups on the planet. From SIM swapping and voice phishing to high-speed ransomware ops, their playbook is chaotic, cloud-savvy and dangerously effective. Tune into this episode to learn how “just messing around online” ballooned into multimillion-dollar attacks. ▶️ https://lnkd.in/dyybhUa7
5
-
Attila Bognar
DIESEC • 3592 Follower:innen
🔒 NIS2 in Germany: Manager’s Responsibility The new NIS2 law elevates cybersecurity to a board-level duty. For managers, ignoring compliance is no longer just an IT gap. It can result in: • Fines and sanctions from regulators • Personal liability for inadequate risk management • Temporary disqualification from management roles (“Leitungsorgane-Verbot”) • Audits and operational restrictions until compliance is proven 👉 In practice, NIS2 demands documented controls, timely incident reporting, and supplier risk oversight. Compliance is not optional, it is a legal obligation. 💡 Organizations that embrace NIS2 proactively don’t just avoid penalties. They build resilience, strengthen supply chain trust, and gain a competitive edge.
2
-
Sean Carpenter
Dynatrace • 797 Follower:innen
Misconfigured components in production remain one of the most common—and most preventable—sources of security risk. 💡 To help prioritize misconfiguration issues, Dynatrace introduced severity classifications for misconfigurations based on the CCSS. Dive into Stefan Achleitner and Roman Windischhofer's for the details.
-
Hooman Minai
Proofpoint • 3593 Follower:innen
Bayerischer Rundfunk (DE): A Proofpoint research report revealed that a modified variant of "Stealerium," an open-source malware distributed for educational purposes, may be used by threat actors to blackmail victims. Bayerischer Rundfunk showcased the story.
1
-
Robert Carloff
5373 Follower:innen
SonicWall disclosed a data breach impacting all MySonicWall cloud backup users. Attackers stole encrypted credentials and configuration data, increasing the risk of targeted attacks. Organizations must assume their firewall configurations are compromised and immediately review and reset all associated credentials. 💥🔒 #cyberattack #cybersecurity #databreach https://lnkd.in/gzUEv_YY
11
1 Kommentar -
Kerrie Rayman, CISSP
Qualys • 1316 Follower:innen
Is your business ready for the cybersecurity challenges of 2026? Qualys’ experts highlight the trends you can’t afford to miss: • Attack Path Modeling: Real-time cyber ranges that enable practical red teaming and what-if simulations. • AI Risk Surface: Rapid, uncoordinated AI adoption expands a largely unseen – and fast-growing – attack surface. • Threat Hunting: Attackers iterate, not innovate – effective hunting tracks real behaviors and the vulnerabilities they keep exploiting. 2026 belongs to security teams that prioritize context over noise and risk-based action that delivers real value. #CyberSecurityTrends #RiskBasedSecurity
-
Andreas Gabelin
1013 Follower:innen
Echt Lesenswert 🧐 Probability is a poor substitute for proof. In 2025, 48,177 CVEs were published, yet Qualys research shows only 1% were weaponized. The "Certainty Gap" is real: teams burn engineering cycles on theoretical risks while reachable attack paths sit in the backlog. Qualys’ Himanshu Kathpal breaks down how TruConfirm and Agent Val shift the model from "Potential Vulnerability" to "Validated Execution." It’s about giving CISOs the only answer that matters: Is this exploitable on our assets, with our controls, right now? No more guessing. Just ground truth inside the Risk Operations Center. Read the blog: https://bit.ly/49XMpU7 #TruRisk #CTEM #Cybersecurity
1
-
Isabel Hashi
Proofpoint • 1788 Follower:innen
Research from Proofpoint says state espionage and organized cybercrime are increasingly going hand in hand. Two hacker groups demonstrate how difficult it has become to clearly identify perpetrators—and how sophisticated their methods are. Read on in it-daily.net | IT-Verlag GmbH .
-
Jason Lewis
Cohesity • 2231 Follower:innen
When you’re one of Europe’s largest airports, downtime is not an option ❌. That’s why Vienna Airport relies on Cohesity for fast, secure, and AI-powered backup and recovery. A clean room recovery environment, 99.9% backup success, and simplified restore workflows? Now that’s next-level resilience. https://lnkd.in/g2F2v98k #WeAreCohesity #DataProtection #AIPoweredBackup
2
-
Christian Koch
3948 Follower:innen
As IT and OT environments continue to merge, organizations gain powerful new capabilities, but also inherit risks that traditional security models weren’t built to handle. Modernizing industrial systems introduces connectivity that exposes legacy OT assets to increasingly sophisticated threats. For SOC teams, this means detecting and responding to incidents now requires deep OT domain expertise, not just IT cybersecurity skills. That specialized knowledge, along with OT-focused monitoring tools, drives higher operational costs for effective SOC coverage. With the right strategy, OT cybersecurity becomes a true business enabler, supporting innovation, automation, and long-term operational growth. NTT DATA Europe & Latam #Cybersecurity
56
3 Kommentare -
José Fontenelle, C-CISO, CISM, CISSP, CEH, CISA, CRISC, CGEIT
ISACA • 20.977 Follower:innen
#CISOTrustAdvisor -> Security Assessments & Technical Audits ! If your Cyber Security Team can not #answer “Who did What, Where, When, How and for How Long", your Cie is #RunningInTheDark with the risky #false Sense of Security ! Implement a #Proactive Cyber Security #Strategy, based on specialized security Assessments & Technical Audits, performing recurring #PenetrationTests, before attackers are successful in exploiting existing vulnerabilities in your IT or OT environment and systems ! Traditional Cyber Security #Reactive strategies and defenses are no longer enough to #Protect Organizations, their Information #Assets and #Value Generation Chain ! Excellent and thanks very much for sharing CISO Whisperer ! And #Congrats to All Top 10 #CISOs in the list. SmartCyber - Segurança Estratégica Proativa ! Security Assessments & Compliance Cyber Security Auditing with Penetration Test & Ethical Hacking #GRC Information & Cyber Security Governance, Risk Management, Compliance & Continuous Audit !
1
-
Hai Gur
Nelysis • 7908 Follower:innen
Safeguarding your BMS and physical environments is more challenging than ever. CCTV networks have long been one of the weakest links in enterprise cybersecurity. These environments are often unattended and assumed to be segregated or air-gapped. But is that really the case? The reality is, many Building Management Systems (BMS) and physical security setups are connected to corporate networks, either directly or indirectly—often without robust security controls. This leaves them exposed to vulnerabilities that can be exploited remotely. It’s time to reassess assumptions and ensure that your physical security infrastructure is no longer a silent risk. T-Online publishes article on Putin's access to NATO cameras: https://lnkd.in/dZPiH2zH
8
-
Pascal Keller
Open Systems • 687 Follower:innen
As cybersecurity regulations evolve, so must the strategies and partnerships that support critical infrastructure. Last week, Open Systems took part in the NIS2 Congress 2025 to engage with peers, policymakers, and industry leaders on how we can collectively raise the bar on resilience and compliance. Check out the recent blog post from the NIS2 Congress in the post below. Reach out to us if you are challenged with compliance and regulatory requirements regarding your network and network security. We are here to support you!
3
-
Denis Laskov
❂ Over 20 years of experience… • 35.528 Follower:innen
Hacking Miele/Siemens dishwashers & washing machines: hidden diagnostic ports and secret keys. 👨🏻💻🍽️🎛️⚡💥 Security researchers Severin von Wnuck-Lipinski and Hajo Noerenberg presented their work on reverse-engineering household appliances - not just washing machines, but also dishwashers, dryers, ovens, and more from Siemens and Miele. A major focus was on Miele appliances, which apparently have a hidden optical diagnostic interface present in almost all models since 1996. It allows reading and calibrating sensors and modifying internal configurations. The authors were able to unlock the interface without proprietary hardware, dump the firmware, and fully control the dishwasher. They also revealed secret diagnostic keys: 1234 and 5678 :) Very interesting and fun talk! Recommended. More details: Hacking washing machines [Youtube]: https://lnkd.in/d_uktPnk #cybersecurity #infosec #miele #Siemens #cooking #food #dishwasher #diagnostics #hacking #embedded #firmware #vulnerability #secret #tech
655
17 Kommentare -
Antonio Ieranò
Antonio Ieranò Consulting • 19.182 Follower:innen
Research from Proofpoint says state espionage and organized cybercrime are increasingly going hand in hand. Two hacker groups demonstrate how difficult it has become to clearly identify perpetrators—and how sophisticated their methods are. Read on in it-daily.net | IT-Verlag GmbH .
1