In the dynamic realm of artificial intelligence (AI), enterprises confront various hurdles in safeguarding the security and privacy of their machine learning (ML) models. The fragmented nature of the AI landscape often results in divergent development endeavors, manual oversight, and incongruous governance standards, impeding scalability and regulatory adherence. Nevertheless, by…
Tag
SECURITY
Information Technology (IT), Security, and Privacy are becoming more and more important by the day in this digital age. The immergence of IT, allowed people to be able to communicate, connect, and innovate at an extraordinary scale, simultaneously creating an increase of interest in the field and many rapid advancements,…
The Domain Name System (DNS) is a critical aspect of the internet. As such, it is on the very frontline of the cybersecurity battle against ever more determined hackers. Unfortunately, many businesses do not appreciate the importance of DNS security – and that exacerbates their vulnerability. This article will briefly…
Cybersecurity has never been more important. Cybercriminals are becoming more prevalent and more sophisticated every day. At the same time, penalties for data breaches and loss of sensitive data are getting more severe. Companies can no longer afford to ignore the need for serious, hard-hitting cybersecurity. However, the kind of…
In April 2021, the IT Security Act 2.0 was passed by the German Federal Ministry of the Interior. Among other things, the regulation provides for changes in connection with the protection of critical infrastructures (KRITIS). For example, KRITIS companies are confronted with the expansion of their reporting obligations. CARMAO GmbH…
In order to completely fulfill the business needs driving the development of 5G by the 3GPP standard organization, 5G uses and introduces technology enablers that transform 5G networks into cloud-based, programmable, software-driven, service-based, and holistically-managed infrastructures, utilizing enablers such as cloud technologies, Artificial Intelligence, open APIs, and Multi-access Edge Computing.…
June 2021: we’re looking back at a pretty bizarre year like we have never experienced before. At least we think so. This pandemic has all the properties of a black swan event, just like the 9/11 attacks. A black swan event comes as a surprise but has major consequences. The…
New standard just published. As payment trends move away from cash and towards online financial transactions, the use of third-party payment (TPP) providers such as PayPal is set to grow. While a convenient way to pay, their increased use inevitably brings with it greater security risks. A new standard for…
ARE PEOPLE REALLY THE WEAKEST LINK IN THE INFORMATION SECURITY CHAIN? This question sounds familiar, right? Indeed, information security is often considered as a chain, and everyone knows that a chain is only as strong as its weakest link is. Starting from this metaphor, it seems like a good idea…
An ethical hacker, a developer, a system engineer and an auditor walk into a bar…you think it‘s a joke, right? It is not the typical set of people having a drink at the bar. And from a professional point of view and with 20+ years of experience in IT and…