„Goddag fra København“ 28/11/2019

Limes Security protects your industrial plants against cyber attacks – soon also increasingly in Nordic Europe. Since its foundation, Limes Security (based in Austria) has been internationally active as a cyber security consulting company – especially so in all of Europe. Limes has a long history with Denmark, as Siemens Gamesa Renewable Energy – formerly […]

MORE
Lifecycle Requirements for Industrial Systems #Part 1 “Automated vulnerability testing” 20/11/2019

In the area of ISO/IEC 62443-4-1 (Secure product development lifecycle requirements), so-called vulnerability tests are indispensable. In the 4-1 standard, this is defined under ‘Practice 5 – Security verification and validation testing’ in the requirement ‘SVV-3 Vulnerability testing’. The process of “Vulnerability Testing” requires that at least the following areas are considered: Unexpected malicious input: […]

MORE
Limes Security is now part of the “Winners’ Club” 12/11/2019

The Best Business Award was presented on November 5th 2019 for the 20th time. With the Best Business Award, the “BBA Forum” brings attention to companies that distinguish themselves in the Danube-Moldau European region through cross-border cooperation. The “Winners’ Club” follows the principle of “learning from the best“. Successful enterprises present their key to success […]

MORE
Everything you need to know about the IEC 62443 standard 05/11/2019

IEC 62443 is the security standard for operators, integrators and manufacturers in the industrial sector. It is a set of rules that is intended to provide adequate security for those who implement it.  Why is the ISO/IEC standard 62443 so important? Why, one might ask, is there so much fuss about the ISO/IEC standard? Quite […]

MORE
IT/OT security and physical security must go hand in hand 23/10/2019

IT/OT security often relies on technical measures to guarantee the security of systems. However, many of these measures are based on the assumption that systems cannot be physically accessed. Therefore, the implementation and enforcement of physical security policies is essential to fully securing assets.   Access protection The counterpart to IT/OT security in the physical […]

MORE