Imagen decorativa Avisos
Blog posted on 16/02/2017

The use of Ethernet communications in different automation systems along with the increase in IT standards in the industrial world are bringing the worlds of IT and OT ever closer, both at a technological and communication level. From this convergence emerge communication standards like PROFINET, which we shall analyse in this article.

Imagen decorativa Avisos
Blog posted on 10/02/2017

The security of a system is fundamentally based on knowledge of the communications developed therein. For this reason, network analyzers are indispensable elements that allow us to identify the information exchanged between elements and discover relevant information, such as erroneous implementations of the stack of some protocols, possible information leaks, non-defined communications, etc.

Imagen decorativa Avisos
Blog posted on 26/01/2017

Sometimes it is necessary to make some adjustments to control system devices, which leads to a reprogramming of PLC, RTU and similar devices. Reprogramming is a complicated step in terms of security and if the process is not adequately executed, the entire process of which the device is a part may be at risk.

Imagen decorativa Avisos

The asset inventory is one of the key tools used to be able to adequately protect control systems and is necessary for other security measures such as risk analysis, network segmentation or patching and updating.

Imagen decorativa Avisos
Blog posted on 22/10/2015

Industry 4.0 is a state of development in the management and organisation of the entire value chain process in the manufacturing industry. This article examines the relationship between cybersecurity for industry 4.0 and the challenges that lie ahead for it in advanced manufacturing.

Imagen decorativa Avisos
Blog posted on 25/08/2015

Control system standards are being updated in order to support and regulate emerging features in these environments. One of the most consulted standards and used as an example in industrial control systems, the ISA99, has also evolved into the IEC 62443 thanks to the International Electrotechnical Commission.

Imagen decorativa Avisos

El framework abierto y de uso más extendido para la comunicación y puntuación de vulnerabilidades, el CVSS (Common Vulnerability Scoring System) ha sido actualizado incorporando mejoras en una nueva version: CVSS 3.0

Imagen decorativa Avisos

En artículos anteriores se ha hablado de mecanismos de control de acceso básico y obligatorio (SELinux). También se han descrito las bases de la autenticación basada en contaseñas. En este nuevo artículo hablaremos de plataformas que aúnan autenticación y control de acceso en una sola tecnología.