Lifecycle Requirements for Industrial Systems #Part 1 “Automated vulnerability testing” 20/11/2019

In the area of ISO/IEC 62443-4-1 (Secure product development lifecycle requirements), so-called vulnerability tests are indispensable. In the 4-1 standard, this is defined under ‘Practice 5 – Security verification and validation testing’ in the requirement ‘SVV-3 Vulnerability testing’. The process of “Vulnerability Testing” requires that at least the following areas are considered: Unexpected malicious input: […]

MORE
Limes Security is now part of the “Winners’ Club” 12/11/2019

The Best Business Award was presented on November 5th 2019 for the 20th time. With the Best Business Award, the “BBA Forum” brings attention to companies that distinguish themselves in the Danube-Moldau European region through cross-border cooperation. The “Winners’ Club” follows the principle of “learning from the best“. Successful enterprises present their key to success […]

MORE
Everything you need to know about the IEC 62443 standard 05/11/2019

IEC 62443 is the security standard for operators, integrators and manufacturers in the industrial sector. It is a set of rules that is intended to provide adequate security for those who implement it.  Why is the ISO/IEC standard 62443 so important? Why, one might ask, is there so much fuss about the ISO/IEC standard? Quite […]

MORE
IT/OT security and physical security must go hand in hand 23/10/2019

IT/OT security often relies on technical measures to guarantee the security of systems. However, many of these measures are based on the assumption that systems cannot be physically accessed. Therefore, the implementation and enforcement of physical security policies is essential to fully securing assets.   Access protection The counterpart to IT/OT security in the physical […]

MORE
How are passwords stored securely? 14/10/2019

Authentication is a core aspect of web applications. Whether online shops like Amazon, online games like World of Warcraft or the PayPal account, they all require a user to first register and then log in when using the application. The password is the recognition feature that tells the application: “This is user xy”. Unfortunately, in […]

MORE