Safety recommendations for electric vehicle charging stations

Posted on 06/02/2020, by
INCIBE (INCIBE)
station
Over the last few years we have seen how electric vehicles have experienced a boom in terms of their development and retail and, along with them, the deployment of their charging points. In this article we will discuss a series of requirements, in terms of security, that should be implemented in these charging stations in order to ensure their security.

Secure use of communications and protocols at charging stations

Posted on 09/01/2020, by
INCIBE (INCIBE)
communications and protocols
Electric charging stations are increasingly used in urban furniture in cities. Electric cars and their need to be charged are a reality. Because of this, there is an increase in supply points that depend on specific protocols and communications for these stations.

5G for the new connected industry

Posted on 19/12/2019, by
INCIBE (INCIBE)
5G ICS
Wireless networks are constantly evolving. As a result, 5G technology is born, continuing the roll-out of mobile phones and other associated services. This new technology is in an advanced stage of development and is already included in a multitude of next-generation devices. In fact, its deployment applied to mobile networks is already being done in numerous major cities in our country.
Etiquetas

SIEM deployment in OT environments

Posted on 14/11/2019, by
INCIBE (INCIBE)
SIEM OT
Today, it is common to find SIEM deployed in the IT infrastructures of all kinds of organisations, to be able to monitor and analyse security alerts in applications, systems, network devices, etc. However, though time and resources are being invested in industrial environments, it is still unresolved.

Aurora vulnerability: origin, explanation and solutions

Posted on 26/09/2019, by
INCIBE (INCIBE)
Aurora_ICS
Perhaps, given the many important cybersecurity leaks and intrusions in recent years involving everything from social media accounts to critical infrastructure and classified military secrets, the attention paid to the Aurora vulnerability has not been proportional to its seriousness and systems affected. This is because it affects almost every electrical system in the world, and potentially any rotating equipment, whether it generates energy or is essential for an industrial or commercial installation. If the threat is so widespread, why isn’t the industry more worried and actively looking for solutions? From this article various possible reasons for this are given.

My industrial devices support LDAP, now what?

Posted on 19/09/2019, by
INCIBE (INCIBE)
Keyring
The main security standards and best practice guidelines in industrial cybersecurity include as a requirement the need for a user authentication system. The options involve implementations in each device of this system or being integrated into a centralised user authentication system. One of the most-used options is the use of the LDAP protocol, but there are a number of points to consider in the design phase, which are key when implementing a specific centralised user management system for industrial control systems, under LDAP.