AI Headphones Allow You To Listen to One Person in a Crowd

In a crowded, noisy environment, have you ever wished you could tune out all the background chatter and focus solely on the person you’re trying to listen to? While noise-canceling headphones have made great strides in creating an auditory blank slate, they still struggle to allow…

The Impact of AI and LLMs on the Future of Jobs

Artificial intelligence (AI) has grown tremendously in recent years, which has created excitement and raised concerns about the future of employment. Large language models (LLMs) are the latest example of that. These powerful subsets of AI are trained on massive amounts of text data to understand…

Uni-MoE: Scaling Unified Multimodal LLMs with Mixture of Experts

The recent advancements in the architecture and performance of Multimodal Large Language Models or MLLMs has highlighted the significance of scalable data and models to enhance performance. Although this approach does enhance the performance, it incurs substantial computational costs that limits the practicality and usability of…

Clearing the “Fog of More” in Cyber Security

At the RSA Conference in San Francisco this month, a dizzying array of dripping hot and new solutions were on display from the cybersecurity industry. Booth after booth claimed to be the tool that will save your organization from bad actors stealing your goodies or blackmailing…

NIS2 is coming – why you should act now – CyberTalk

NIS2 is coming – why you should act now – CyberTalk

By Patrick Scholl, Head of Operational Technology, Infinigate

NIS2 – the Network and Information Security Directive – is a revision of the NIS Directive, which came into force in 2016, with the aim of strengthening cyber security resilience across the EU.

The revision tightens reporting requirements and introduces stricter control measures and enforcement provisions. By October 17th 2024, the NIS2 Directive will be a requirement across all EU member states. Despite the urgency, businesses still have many questions.

Distributors like Infinigate are committed to supporting the implementation of NIS2 by offering a broad choice of cyber security solutions and services in collaboration with vendors, such as Check Point.

Supporting NIS2 implementation

In Germany, as an example, NIS2UmsuCG, the local directive governing the implementation of the EU NIS2 to strengthen cyber security, is already available as a draft and defines EU-wide minimum standards that will be transferred into national regulation.

It is estimated that around 30,000 companies in Germany will have to make changes to comply. However, thus far, only a minority have adopted the measures mandated by the new directive. Sometimes, symbolic measures are taken with little effect. In view of the complexity of the NIS2 requirements, the short time in which they are to be implemented and the need for holistic and long-term solutions, companies need strong partners who can advise on how to increase their cyber resilience.

Who is affected?

The NIS2 directive coming into force in autumn 2024 will apply to organisations across 18 sectors with 50 or more employees and a turnover of €10 million. Additionally, some entities will be regulated regardless of their size — especially in the areas of ‘essential’ digital infrastructure and public administration.

The following industry sectors fall under the ‘essential’ category:

  • Energy
  • Transport
  • Banking and finance
  • Education
  • Water supply
  • Digital infrastructure
  • ICT service management
  • Public administration
  • Space exploration and research
  • Postal and courier services
  • Waste management
  • Chemical manufacturing, production and distribution
  • Food production, processing and distribution
  • Industry & manufacturing (medical devices and in-vitro, data processing, electronics, optics, electrical equipment, mechanical engineering, motor vehicles and parts, vehicle manufacturing)
  • Digital suppliers (marketplaces, search engines, social networks)
  • Research institutes

It’s worth bearing in mind that NIS2 regulations apply not only to companies, but also their contractors.

Good to know: The “size-cap” rule

The “size-cap” rule is one of the innovations that come with NIS2 and is intended to level out inequalities linked with varying requirements and risk profiles, budgets, resources and expertise. The regulation is intended to enable start-ups and medium-sized companies as well as large corporations to be able to implement the security measures required by NIS2.

You can get NIS2 compliance tips here: https://nis2-check.de/

NIS2 in a nutshell

In Germany, companies are required to register with the BSI (Federal Office for Information Security), for their relevant areas. A fundamental rule is that any security incidents must be reported immediately.

Across Europe, the strict security requirements mandated by NIS2 include the following:

  • Risk management: identify, assess and remedy

Companies are required to take appropriate and proportionate technical, operational and organisational measures. A holistic approach should ensure that risks to the security of network and information systems can be adequately managed.

  • Security assessment: a self-analysis

Security assessment includes questions such as: what vulnerabilities are there in the company? What is the state of cyber hygiene? What security practices are already in place today? Are there misconfigured accounts that could be vulnerable to data theft or manipulation?

  • Access management: protecting privileged accounts

Companies subject to NIS2 regulations are encouraged to restrict the number of administrator-level accounts and change passwords regularly. This lowers the risk of network cyber security breaches threatening business continuity.

  • Closing the entry gates: ransomware and supply chain security

One of the main concerns of the NIS2 directive is proactive protection against ransomware. Endpoint security solutions can help here. Employee training is another necessary step to create risk awareness and help identify and prevent cyber attacks.

The focus here should be on best practices in handling sensitive data and the secure use of IT and OT systems. Supply chain vulnerability is a major area of concern. Companies need to ensure that the security features and standards of the machines, products and services they purchase meet current security requirements.

  • Zero tolerance strategy: access control and zero trust

In a world where corporate boundaries are increasingly blurred due to digitalisation, cloud infrastructures and decentralised working models, perimeter-based architectures have had their day. A zero trust concept provides multiple lines of defence, relies on strong authentication methods and threat analysis to validate access attempts.

  • Business continuity: prepared for emergencies

Business continuity management measures are essential to ensure that critical systems can be maintained in the event of an emergency. These include backup management, disaster recovery, crisis management and emergency plans.

In summary, we should not let the complexity of the topic discourage us from taking action; after all, NIS2 is for our benefit, to help us protect our business assets from increasing cyber risk.

Businesses would be well advised to start on the route to assessing their security posture and current status vis-à-vis NIS2 requirements. You can make a start by simply identifying all relevant stakeholders in your organisation, starting a task-force and gathering intelligence on your cyber risk.

Identify key steps and build a roadmap to compliance that is manageable for your resources; your channel partners can help by providing expert advice https://page.infinigate.com/nis2-checkpoint.

OpenAI disrupts five covert influence operations

In the last three months, OpenAI has disrupted five covert influence operations (IO) that attempted to exploit the company’s models for deceptive activities online. As of May 2024, these campaigns have not shown a substantial increase in audience engagement or reach due to OpenAI’s services. OpenAI…

The Legend Of Zelda: Majora’s Mask Part 16 | Super Replay

The Legend Of Zelda: Majora’s Mask Part 16 | Super Replay

After The Legend of Zelda: Ocarina of Time reinvented the series in 3D and became its new gold standard, Nintendo followed up with a surreal sequel in Majora’s Mask. Set two months after the events of Ocarina, Link finds himself transported to an alternate version of Hyrule called Termina and must prevent a very angry moon from crashing into the Earth over the course of three constantly repeating days. Majora’s Mask’s unique structure and bizarre tone have earned it legions of passionate defenders and detractors, and one long-time Zelda fan is going to experience it for the first time to see where he lands on that spectrum.

Join Marcus Stewart and Kyle Hilliard today and each Friday on Twitch at 1:00 p.m. CT as they gradually work their way through the entire game until Termina is saved. Archived episodes will be uploaded each Saturday on our second YouTube channel Game Informer Shows, which you can watch both above and by clicking the links below. 

Part 1 – Plenty of Time
Part 2 – The Bear
Part 3 – Deku Ball Z
Part 4 – Pig Out
Part 5 – The Was a Bad Choice!
Part 6 – Ray Darmani
Part 7 – Curl and Pound
Part 8 – Almost a Flamethrower
Part 9 – Take Me Higher
Part 10 – Time Juice
Part 11 – The One About Joey
Part 12 – Ugly Country
Part 13 – The Sword is the Chicken Hat
Part 14 – Harvard for Hyrule
Part 15 – Keeping it Pure

[embedded content]

If you enjoy our livestreams but haven’t subscribed to our Twitch channel, know that doing so not only gives you notifications and access to special emotes. You’ll also be granted entry to the official Game Informer Discord channel, where our welcoming community members, moderators, and staff gather to talk games, entertainment, food, and organize hangouts! Be sure to also follow our second YouTube channel, Game Informer Shows, to watch other Replay episodes as well as Twitch archives of GI Live and more. 

Arm unveils new AI designs and software for smartphones

AI models are rapidly evolving, outpacing hardware capabilities, which presents an opportunity for Arm to innovate across the compute stack. Recently, Arm unveiled new chip blueprints and software tools aimed at enhancing smartphones’ ability to handle AI tasks more efficiently. But they didn’t stop there –…