Endpoint Cybersecurity GmbH
- Accelerating feature delivery in software development
- How-To create Security User Stories
- Delivering secure software in an agile way
- Understanding Defense in Depth in IT Security
- ISO 27001:2022 and TISAX: overlaps and differences
- Understanding the SOC 2 Certification
- Introduction to CISA’s Secure by Design Initiative
- Implementing ISO 27001:2022 Annex A.18 – Compliance
- Maping NIS2 requirements to the ISO 27001:2022 framework
- Implementing ISO 27001:2022 Annex A.17 – Information Security Aspects of Business Continuity Management
ChatGPT and automotive cybersecurity #1/2: About CSMS from ISO 21434
/in EducationalAs promised, I played more with ChatGPT and this time I started to dig a bit into cybersecurity for automotive. Since I am working these days on CSMS (based on ISO ECE 21434 and TISAX), part of my companies consulting offer for automotive I thought maybe I check what ChatGPT things about them. Unfortunately, nothing […]
A brief history of software vulnerabilities in vehicles (Update 2023)
/in EducationalUpdated in 2023: 2023: Sam Curry: Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More Kia, Honda, Infiniti, Nissan, Acura Fully remote lock, unlock, engine start, engine stop, precision locate, flash headlights, and honk vehicles using only the VIN number Fully remote account takeover and PII disclosure via VIN […]
Risk Assessment of AWS services used in building a resilient Web App on AWS
/in EducationalWe wrote here in the article “Building Resilient Web Applications on AWS: A Comprehensive Approach to Security” how to use certain AWS services to implement a resilient web based application. The services mentioned require also a brief analysis in respect to Security, Confidentiality, Integrity, Availability and Privacy. Contents Toggle CloudTrail Risk Assessment Mitigation Privacy CloudWatch Risk […]
Endpoint Cybersecurity Sponsoring local volleyball team
/in PostEndpoint Cybersecurity GmbH is proud to sponsor the volleyball team of 12-16 years old from TV Langenargen. Endpoint Cybersecurity’s CEO, Sorin Mustaca proudly taking a photo together with the team.
Why companies producing security software need 3rd party help in adding additional security technologies
/in PostIf you produce some security software (Anti-malware, Anti-ransomware, URL Filter, etc.) you should never count only on one source of knowledge to deliver your product’s value to the customers. Many companies think that this is their core competence and they refuse to look into other directions. This is fundamentally wrong, even if you are a […]