Imagen decorativa Avisos
Blog posted on 25/06/2020

In this post we explain the update made in the IMC model to continue improving its approach and applicability to companies.

Imagen decorativa Avisos
Blog posted on 18/06/2020

In this blog post we detail the new PGP keys generated by INCIBE-CERT to establish secure communication channels with different audiences.

Imagen decorativa Avisos
Blog posted on 11/06/2020

Anticipating is one of the four aims of cyberresilience. It consists of maintaining a state of informed readiness, in order to prevent essential services from being compromised in the event of a cyberattack. To measure the objectives of this aim, its three functional domains are analysed: cybersecurity policies, risk management and cybersecurity training.

Imagen decorativa Avisos
Blog posted on 14/05/2020

The goal of cyber-resilience for an organization, whether or not it belongs to a strategic sector, whether or not it provides one of these digital services, is to maintain its primary purpose and integrity in the face of a cybersecurity threat or attack to an ideal level. Continuous detection processes must be established given that total prevention will never be guaranteed.

Imagen decorativa Avisos
Blog posted on 09/01/2020

Electric charging stations are increasingly used in urban furniture in cities. Electric cars and their need to be charged are a reality. Because of this, there is an increase in supply points that depend on specific protocols and communications for these stations.

Imagen decorativa Avisos
Blog posted on 22/08/2019

The union of the IT and OT worlds is unstoppable, which means that the cybersecurity strategy, traditionally focused on the IT field, must now include aspects related to the industrial world. Having a good cybersecurity strategy is essential for IC systems to survive in this new era.

Imagen decorativa Avisos
Blog posted on 01/08/2019

The open and most-widely-used framework for communication and vulnerability scoring, the CVSS (Common Vulnerability Scoring System), has been updated, incorporating improvements in its new version 3.1 with respect to the previous one. This standard assesses the severity of computer systems vulnerabilities and assigns them a score of 0 to 10.

Imagen decorativa Avisos
Blog posted on 11/07/2019

Trips across the ocean have changed over the years with the arrival of the industrial revolution and information technology, among other things, making technology its best ally, both to automate their navigation and to control their location from land-based stations. However, this total dependence on technology brings with it important security issues that need to be addressed with the importance they deserve.

Imagen decorativa Avisos
Blog posted on 22/02/2018

The problems originating from the application of patches in an industrial setting have consequently led to them being rejected by the operators. For years they were practically abandoned, but thanks to the support from security companies and IT departments they are now receiving their due credit.

Imagen decorativa Avisos
Blog posted on 23/11/2017

The protection of critical and strategic infrastructures in our country is a task that must be tackled by all the agents involved in a public-private cooperation framework.

Go top