The Dilemma of Generative AI: Lessons Learned from 2025 (so far)

In working places, generative artificial intelligence (AI) increases efficiency, accelerates processes, and assists with decision-making. However, all these advantages are accessible to those with less noble intentions, and the technology itself has high potentials to fall victim to emerging vulnerabilities as recent disclosures demonstrate. Decision-makers must therefore anticipate the risks of generative AI, prepare their organizations, and implement sustainable countermeasures.

Read more

Interview in NITECH: Data-Centric Security

Data-centric security (DCS) focuses on protecting data, regardless of where it is stored. Through encryption, context-based access controls, and monitoring, organizations can maintain control over sensitive information. This allows them to reliably implement regulatory requirements such as NIS2 or GDPR. In an interview in the current issue of NITECH, Marion Konnerth (Head of Projects) and Dennis Füller (Head of Cybersecurity Consulting Defense) explain how this approach works and what role it plays in compliance.

Read more

White paper: Trustworthiness for AI in European Defence

In the evolving geopolitical landscape marked by complex, hybrid threats, it is clear that artificial intelligence (AI) has already become an integral part of security-relevant digital systems within the defence industry. AI can make decisions in seconds, operate systems autonomously, and analyse vast amounts of data. However, without clear principles - such as transparency, reliability, resilience, and accountability - there is a risk of losing control.

Read more

infodas signs contract with Thales for German naval program F 126

infodas, an Airbus subsidiary specializing in cyber and IT, has been commissioned by Thales to supply IT security components for a German naval program. In total, infodas will equip six Frigates of class 126 (F 126) and three mission modules ‘ASW Lagebild’ with the SDoT (Secure Domain Transition) Security Gateway. As part of the contract, […]

Read more

Interview in NITECH: The National Secure Cloud

As part of a strong consortium, the National Secure Cloud (NSC) is committed to ensuring the usability of cloud technologies up to the classification level DEU SECRET. Only technologies that have already been approved by the German Federal Office for Information Security (BSI) are used in the development of the NSC. In the current issue […]

Read more

Data Leakage 2024+ in a Nutshell: Current Cyberthreat Tactics and Beyond – Part II

We would like to welcome you to PART II of the series 'Data Leakage 2024+ in a Nutshell: Current Cyberthreat Tactics and Beyond', which is all about AI technology. However, we are not discussing the general threat posed by AI. Rather, we would like to shed light on the relationship between AI technology and data leakage in particular, or how both subject influence each other in the near future.

Read more

What is STANAG?

There are numerous STANAGs covering a wide range of topics, including communications, logistics, intelligence, and training. Some examples include STANAG 6001, which specifies the requirements for NATO military personnel language proficiency, and STANAG 4586, which defines the standards for interoperability of military data systems.

Read more

Air Gapping and Cross Domain Solutions in a Nutshell

An air gap, also known as a “separation gap,” is a security measure used to physically isolate a computer or networks with different security requirements amongst each other. Air gaps are still widely used in today’s high security domains, mainly because of their alleged high security and they are implemented mainly through the use of […]

Read more

Cyberthreats to the Shipping Industry and how to mitigate them

When thinking about cybersecurity or cyberthreats, most people will have in mind server roomsfull of blinking lights, SOCs where network operations are monitored by cyber teams or evil hackers wearing a black sweater trying to break into some kind of hi-tech datacenter. Nobody would ever think about one of the thousands of bulky, low-tech and […]

Read more

Of warships and cybersecurity: the challenges of modernization in times of digitalization

Navies are constantly modernising their fleet through digitalization programmes. To take advantage of new communication technologies and their numerous benefits such as real-time decision making and information sharing, former air gapped systems are being connected with the IT world. Consequently, sensitive networks are being integrated with less secure ones. Modern warships are designed to take […]

Read more

Protection des réseaux d’importance vitale en France

Depuis 2006, les infrastructures critiques ont été reconnues par le Gouvernement français comme stratégiques pour la sécurité du pays[1]. Faisant le constat de l’importance de leurs activités et du nombre croissant d’attaques-cyber pesant sur elles, la France s’est depuis dotée d’une règlementation complète afin d’assurer leur sécurité et résilience. C’est l’un des premiers pays à […]

Read more

Sécuriser les échanges de données sensibles avec des passerelles d’interconnexion

Les systèmes et données hautement sensibles sont normalement séparés d’Internet et des autres systèmes moins critiques. Cette séparation est réalisée par l’isolement de ces systèmes critiques, méthode connue sous le nom d’air gap. Bien que cette isolation protège efficacement contre tous risques d’exfiltration de données et d’attaques de logiciels malveillants, le risque de cyberattaques n’est […]

Read more