Erfrischend ausgewogene Einordnung von Anthropics generativem LLM Mythos, das auf das Finden von Sicherheitslücken trainiert ist. Zwischen Katastrophen-Porno und dem üblichen Ignorieren könnte dies der Weckruf sein, endlich konsequent IT-Sicherheit und Security by Design ernst zu nehmen. https://www.derstandard.de/story/3000000318156/die-mythos-panik-wie-gefaehrlich-das-neue-ki-modell-von-anthropic-wirklich-ist

#ITSicherheit #SecurityByDesign #Mythos

Die Mythos-Panik: Wie gefährlich das neue KI-Modell von Anthropic wirklich ist

Die Aufregung um das KI-Modell wird immer größer, die Schlagzeilen immer reißerischer. Doch was ist real, was Marketing und was schlichtes Unverständnis?

DER STANDARD

Elasticsearch 7 → 8 is not a simple upgrade.

It’s a migration.

New clients, #SecurityByDesign and API changes make this more complex than many teams expect — we’ve seen it firsthand.

We break down what really changes on the Karakun #DeveloperHub when moving from #Elasticsearch 7.17 to 8.19, including client updates, mappings and error handling.

Practical guide (incl. code & pitfalls):
https://dev.karakun.com/2026/03/26/elasticsearch-7-to-8-migration-guide.html

#Java #SoftwareEngineering #TechMigration

Was meint ihr wie meine Projektarbeit bei potentiellen Arbeitgebern ankommen wird?

"Evaluierung und Implementierung einer souveränen,
hyperkonvergenten Virtualisierungsplattform (HCI) zur resilienten Bereitstellung
kritischer Workloads in regulierten Umgebungen."

#kritis #foss #securitybydesign

🇪🇺📢 As #ChatControl will hopefully end, a new study proves mass scanning tech is flawed & easily evaded. 🔬

To truly protect kids now, we must shift from broken algorithms to targeted police work 🕵️‍♂️ and strict #SecurityByDesign 🛡️.

Read: https://www.patrick-breyer.de/en/end-of-chat-control-paving-the-way-for-genuine-child-protection/

End of "Chat Control": Paving the Way for Genuine Child Protection!

The controversial mass surveillance of private messages in Europe could soon come to an end. Negotiations between the European Parliament and EU member states regarding the extension of the so-called "Chat Control" concluded yesterday without an agreement. This means that starting April 4, US tech g

Patrick Breyer

🇩🇪📢 Neue Studie passend zum mgl. #Chatkontrolle-Aus: Massenscan-Technik ist fehlerhaft und leicht zu umgehen. 🔬

Um Kinder jetzt wirklich zu schützen, brauchen wir gezielte Ermittlungen 🕵️‍♂️ und sichere Apps #SecurityByDesign 🛡️.

Infos: https://www.patrick-breyer.de/ende-der-chatkontrolle-weg-frei-fuer-echten-kinderschutz/

FUNDING SECURITY FOR PLACES OF WORSHIP

The SOAR guide explains how Security by Design measures can be financed through:

• Public and municipal funding
• Energy-efficiency grants
• Phased renovation planning
• Crowdfunding and donations

Includes examples from Germany, Hungary and France.

PDF:
https://soarproject.eu/wp-content/uploads/2022/12/Funding-Mechanisms-for-Places-of-Worship.pdf

#PARTESSCOM #SecurityByDesign #ProtectPlacesOfWorship

Cyber Resilience Act: Die Uhr tickt – und viele Unternehmen schauen noch zu. Ab dem 11. September 2026 gilt EU-weit eine strikte Meldepflicht für Hersteller vernetzter Produkte. Aktiv ausgenutzte Schwachstellen und schwerwiegende Cybervorfälle müssen unverzüglich an die Behörden gemeldet werden. Die ENISA baut dafür bereits eine zentrale Plattform auf. #CyberResilienceAct #CRA #Cybersicherheit #SecurityByDesign #Compliance #Mittelstand #ENISA
Mi-Co: anatomia della security nell'Olimpiade piu' complessa di sempre: di Ilaria Garaffoni Milano-Cortina 2026 non e' solo un evento monster: e' un esperimento di ingegneria organizzativa, territoriale e di sicurezza integrata. In questo cantiere di complessita' - fatto di citta' che non dormono, fiere che si susseguono, montagne che non perdonano e infrastrutture diverse...
#Mi-Co #security #olimpiade #IlariaGaraffoni #securitybydesign http://dlvr.it/TQtssz

🏋️ 𝗡𝗼𝗿𝘁𝗵𝗦𝗲𝗰 𝟮𝟬𝟮𝟲 𝗙𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻𝘀/𝗧𝗿𝗮𝗶𝗻𝗶𝗻𝗴𝘀 (𝟮/𝟭𝟮): "Beyond Whiteboard Hacking: Master AI-Enhanced Threat Modeling" 𝗽𝗮𝗿/𝗯𝘆 Steven Wierckx (Toreon)

📅 Dates: May 11 and 12, 2026 (2 days)
📊 Difficulty: Medium
🖥️ Mode: On-Site

Description: "𝘛𝘩𝘪𝘴 𝘵𝘳𝘢𝘪𝘯𝘪𝘯𝘨 𝘵𝘢𝘬𝘦𝘴 𝘺𝘰𝘶 𝘥𝘦𝘦𝘱 𝘪𝘯𝘵𝘰 𝘵𝘩𝘦 𝘱𝘳𝘢𝘤𝘵𝘪𝘤𝘢𝘭 𝘸𝘰𝘳𝘭𝘥 𝘰𝘧 𝘵𝘩𝘳𝘦𝘢𝘵 𝘮𝘰𝘥𝘦𝘭𝘪𝘯𝘨, 𝘤𝘰𝘮𝘣𝘪𝘯𝘪𝘯𝘨 𝘩𝘢𝘯𝘥𝘴-𝘰𝘯 𝘦𝘹𝘦𝘳𝘤𝘪𝘴𝘦𝘴 𝘢𝘯𝘥 𝘳𝘦𝘢𝘭-𝘸𝘰𝘳𝘭𝘥 𝘴𝘤𝘦𝘯𝘢𝘳𝘪𝘰𝘴. 𝘛𝘩𝘪𝘴 𝘩𝘢𝘯𝘥𝘴-𝘰𝘯 𝘵𝘩𝘳𝘦𝘢𝘵 𝘮𝘰𝘥𝘦𝘭𝘪𝘯𝘨 𝘵𝘳𝘢𝘪𝘯𝘪𝘯𝘨 𝘰𝘧𝘧𝘦𝘳𝘴 𝘢𝘯 𝘪𝘮𝘮𝘦𝘳𝘴𝘪𝘷𝘦 𝘦𝘹𝘱𝘦𝘳𝘪𝘦𝘯𝘤𝘦, 𝘨𝘳𝘰𝘶𝘯𝘥𝘦𝘥 𝘪𝘯 25 𝘺𝘦𝘢𝘳𝘴 𝘰𝘧 𝘱𝘳𝘢𝘤𝘵𝘪𝘤𝘢𝘭 𝘦𝘹𝘱𝘦𝘳𝘵𝘪𝘴𝘦, 𝘢𝘯𝘥 𝘳𝘦𝘧𝘪𝘯𝘦𝘥 𝘧𝘰𝘳 𝘰𝘷𝘦𝘳 𝘢 𝘥𝘦𝘤𝘢𝘥𝘦 𝘰𝘧 𝘥𝘦𝘭𝘪𝘷𝘦𝘳𝘺 𝘢𝘵 𝘉𝘭𝘢𝘤𝘬 𝘏𝘢𝘵, 𝘢𝘷𝘰𝘪𝘥𝘪𝘯𝘨 𝘢 𝘭𝘦𝘤𝘵𝘶𝘳𝘦-𝘩𝘦𝘢𝘷𝘺 𝘢𝘱𝘱𝘳𝘰𝘢𝘤𝘩 (70% 𝘰𝘧 𝘵𝘩𝘦 𝘤𝘰𝘶𝘳𝘴𝘦 𝘪𝘴 𝘧𝘰𝘤𝘶𝘴𝘦𝘥 𝘰𝘯 𝘦𝘹𝘦𝘳𝘤𝘪𝘴𝘦𝘴 𝘵𝘰 𝘳𝘦𝘪𝘯𝘧𝘰𝘳𝘤𝘦 𝘭𝘦𝘢𝘳𝘯𝘪𝘯𝘨). 𝘉𝘺 𝘵𝘩𝘦 𝘦𝘯𝘥 𝘰𝘧 𝘵𝘩𝘪𝘴 𝘵𝘳𝘢𝘪𝘯𝘪𝘯𝘨, 𝘺𝘰𝘶 𝘸𝘪𝘭𝘭 𝘸𝘢𝘭𝘬 𝘢𝘸𝘢𝘺 𝘯𝘰𝘵 𝘫𝘶𝘴𝘵 𝘸𝘪𝘵𝘩 𝘬𝘯𝘰𝘸𝘭𝘦𝘥𝘨𝘦, 𝘣𝘶𝘵 𝘵𝘩𝘦 𝘢𝘣𝘪𝘭𝘪𝘵𝘺 𝘵𝘰 𝘱𝘳𝘢𝘤𝘵𝘪𝘤𝘦 𝘵𝘩𝘳𝘦𝘢𝘵 𝘮𝘰𝘥𝘦𝘭𝘪𝘯𝘨 𝘦𝘧𝘧𝘦𝘤𝘵𝘪𝘷𝘦𝘭𝘺 𝘪𝘯 𝘺𝘰𝘶𝘳 𝘰𝘳𝘨𝘢𝘯𝘪𝘻𝘢𝘵𝘪𝘰𝘯. "
🔗 Full Training Details: https://nsec.io/training/2026-beyond-whiteboard-hacking-master-ai-enhanced-threat-modeling/

👨‍🏫 About the trainer:
Steven Wierckx (Toreon) is a seasoned software and security tester with 15 years of experience in programming, security testing, source code review, test automation, functional and technical analysis, development, and database design. Steven shares his web application security passion by writing about and through training on testing software for security problems, secure coding, security awareness, security testing, and threat modeling. He’s the OWASP Threat Modeling Project Lead and organises the BruCON student CTF. Last year, he spoke at Hack in the Box Amsterdam, hosted a workshop at BruCON, and provided threat modeling training at OWASP AppSec USA and O’Reilly Security New York.

#NorthSec #cybersecurity #threatmodeling #AIsecurity #LLM #DevOps #securitybydesign

Hackers (if breached)
True E2EE means even the vendor can't read your data.
Yes, it makes some features harder. But privacy isn't supposed to be convenient. It's supposed to be secure.
Where's the ProtonMail of CRMs?
#Encryption #PrivacyFirst #SecurityByDesign