Far away, but still on site: security testing with distance 10/09/2020

An attacker in your own network: Many companies had to go through this worst-case scenario. With Limes Security, companies have a strong partner who identifies and points out these dangers and is now even more flexible. With a new system, Limes offers the possibility of being virtually on site at the customer’s premises. This saves […]

MORE
Ein Security Deshi auf Reisen [DE] 10/08/2020

Eine Geschichte aus dem Leben eines Praktikanten   Im Zuge meines Studiums, „Sichere Informationssysteme“ habe ich ein verpflichtendes Berufspraktikum absolviert. Die Auswahl eines Praktikumsgebers stellt Studenten, die in kürzester Zeit so viele unterschiedliche Bereiche einer Sparte kennenlernen, vor die Frage: „Was will ich eigentlich wirklich machen?“ Hier hat sich Limes Security durch ihren Facettenreichtum als […]

MORE
Procurement of secure plant components with IEC 62443 06/05/2020

Secure OT operation starts already with procurement, we’re therefore looking into the relevance of procurement of secure industrial components with IEC62443 in this post. From the asset owner’s point of view, the IEC 62443-4 part is particularly important for the procurement process. This part addresses component manufacturers and the security capabilities of components. This includes […]

MORE
A big THANKS to all critical infrastructure people 27/04/2020

During a pandemic crisis it becomes visible that our modern society heavily depends on different types of critical infrastructures that are supplying essential services enabling our comfortable lives. These critical infrastructures include, among others: Energy supply such as electricity-grids, oil-, gas- and heat-grids, refineries, fresh water supply and waste-water treatment facilities, public transport, airports, payment […]

MORE
An agent named Drozer 21/03/2020

How Drozer can collect data from your installed apps In recent years, the use of mobile devices such as smartphones and tablets has increased dramatically. Apps have become a fixed part of our everyday life. Unfortunately, it is often overlooked that these apps require the same IT security as traditional desktop applications or websites. A […]

MORE