Blog

Contenido Blog

Cyber-resilience: the key to overcoming incidents

Posted on 14/05/2020, by
INCIBE (INCIBE)
Cyber-resilience
The goal of cyber-resilience for an organization, whether or not it belongs to a strategic sector, whether or not it provides one of these digital services, is to maintain its primary purpose and integrity in the face of a cybersecurity threat or attack to an ideal level. Continuous detection processes must be established given that total prevention will never be guaranteed.

Sodinokibi: features and operation

Posted on 06/04/2020, by
INCIBE (INCIBE)
Sodinokibi
The ransomware attacks have experienced a great evolution from its beginnings, being able to identify a great amount of different families at the present time, many of them are highly sophisticated, with high propagation and persistence. In this blog we explain what is Sodinokibi and how it works.

Teleworking: VPN and other recommendations

Posted on 30/03/2020, by
Adrián Flecha (INCIBE)
Teletrabajo: VPN y otras recomendaciones
In this article, we review virtual private networks, or VPNs, one of the most important measures for teleworking, as they allow a connection to the organization through secure networks, and the advantages they offer, as well as additional security recommendations to help ensure cyber security.

Guide for an asset inventory management in industrial control systems

Posted on 12/03/2020, by
INCIBE (INCIBE)
decorative image
The first step in securing industrial control systems is making an inventory containing all the assets involved in the process. With this information, the inventory can be used to properly manage vulnerabilities, which will make it possible to take the necessary measures to solve and mitigate them.

NTP, SNTP and PTP: what time synchronization do I need?

Posted on 05/03/2020, by
INCIBE (INCIBE)
NTP, SNTP and PTP
Time synchronization in industrial devices is a critical factor. In terms of time, industrial processes and the programming logic of industrial devices have specific needs. These may require specific accuracy that determines the need to use one protocol or another, as well as dependencies on cost or on the network infrastructure itself. Explaining the main differences is key when using one or another in industrial infrastructures. Just as each protocol has different nuances, there are certain differences to be taken into account within security.

Evolving towards secure Modbus

Posted on 20/02/2020, by
INCIBE (INCIBE)
Modbus decorative image
The Modbus protocol, in its TCP version, was not developed with cybersecurity capabilities in its communications. For this reason, many researchers have studied the different possibilities that could be undertaken at the technical level to incorporate a security layer in it, giving rise to a new version of Modbus/TCP called secure Modbus/TCP, which will gradually begin to be implemented in industrial communications.
Etiquetas