Back to the Future Cyber Security – Chapter 4, Episode 2: When unauthorized access and unqualified people team up to cause havoc

*WARNING* These are real incidents from the field and could scare you. A lot! *WARNING* Liquid aluminium has 3 very dangerous characteristics. It is extremely hot, aggressive to most materials including other metals and responds explosive when in contact with water. Three reasons to be extremely careful when handling liquid aluminum. Safety precautions are important, [Read more]

Back to the Future Cyber Security – Chapter 4, Episode 1: Real incidents from the field

*WARNING* These are real incidents from the field and could scare you. A lot! *WARNING* We talk a lot about what could go wrong with Cyber Security and what could be done to prevent it. Let’s have a look at what already happened and what should have been done to prevent it. Just to make [Read more]

Back to the Future Cyber Security – Chapter 3: Rethink and act, a Manifesto

With the introduction of Industry 4.0 by the German Government and the designated workgroup, a roadmap was created to introduce Artificial Intelligence, Smart Controls, Smart Automation and Industrial Internet of Things (IIoT) in combination with Big Data into the manufacturing industries in Germany and beyond. When Siemens AG introduced the Charter of Trust during the 2018 Munich Security [Read more]

Back to the Future Cyber Security – Chapter 2: A new strategy for Legacy Risk is needed!

  When you stay informed about new developments in Internet of Things and Industry 4.0, you might easily get the impression that factories are filled with the latest greatest in technology. A short factory tour in most production facilities will remind you immediately that the majority of the active machines and equipment are far from [Read more]

Back to the Future Cyber Security – Chapter 1: The Industrial Legacy

Do you know who Big Blue is? Follow the link if you don’t, but most of us will know that IBM is known as Big Blue. Think about that for a while. A nickname for a company that (almost) everyone knows. Some say this is a deliberate marketing strategy, based on the blue logo of IBM. [Read more]

Cyber Security Myth Busting

There are many myths about Cyber Security and Internet Safety and it is time to bust a bunch of them. These myths are dangerous because they give a false sens of security and safety. People believing these myths will understandably believe they are safe and therefore see no reason whatsoever to take precautions. Why should [Read more]

Internet voor Kids

Wat ben je aan het doen? Ik bereid een workshop voor waarin ik mensen ga uitleggen hoe ze zichzelf moeten beschermen op het internet. Gaaf, kun je me dat ook uitleggen? Na een aantal jaar volwassenen te hebben uitgelegd hoe ze zichzelf moesten beschermen bij het gebruik van internet, merkte ik dat ik op zoek [Read more]

The Internet of Kids

What are you doing? I am preparing a workshop where I will explain people how they should protect themselves in the internet. Cool, can you explain me that, too? After several years of explaining adults how to protect themselves when using the internet, I found myself searching for words to explain my own child the [Read more]