Cyber Security by ITK Engineering
Master SecOC in practice - Learn to know the three major operational challenges
13:14
Cyber Security by ITK Engineering
Internet of Medical Things - 5 ways to make your medical product smart but secure
9:32
Cyber Security by ITK Engineering
Log4J – it’s not over! You should check whether these measures are in place.
9:58
Cyber Security by ITK Engineering
Elliptic Curve Cryptography – From useless to indispensable
11:21
Cyber Security by ITK Engineering
Cybersecurity Risk Assessment (TRA/TARA) – Why to use attack trees, and when to keep away from them?
14:47
Cyber Security by ITK Engineering
The new Authentication Service (0x29) of the Unified Diagnostic Services (UDS) [ISO 14229]
10:59
Cyber Security by ITK Engineering
Check this out: the ITK Engineering main YouTube channel
1:10
Cyber Security by ITK Engineering
#Hiring!
0:55
Cyber Security by ITK Engineering
Cybersecurity Penetration / Pen Testing - What is it and why is it so challenging? [ISO21434]
7:02
Cyber Security by ITK Engineering
How NOT to apply encryption - an attacker's perspective
22:56
Cyber Security by ITK Engineering
How NOT to store secrets in your devices - an attacker's perspective
28:32
Cyber Security by ITK Engineering
Cybersecurity Christmas Special - A short look back to the year 2020
8:45
Cyber Security by ITK Engineering
Cybersecurity Concepts - More than just requirements for development [ISO 21434]
8:04
Cyber Security by ITK Engineering
Cybersecurity Risk Assessment (TRA / TARA) - What to look out for in a Risk Analysis? [ISO 21434]
9:11
Cyber Security by ITK Engineering
How to comply with the UNECE / ISO SAE 21434 cyber security regulation?
18:06