Blog

Contenido Blog

Industrial security 2019 in figures

Posted on 23/01/2020, by
INCIBE (INCIBE)
Industrial security 2019
Throughout the year 2019, we have worked on the detection, treatment and preparation of notices related to cybersecurity in industrial environments, classifying them based on the sector, manufacturer, criticality, etc. This article summarises this work and makes a brief prediction of the events that will take place in 2020.

5G for the new connected industry

Posted on 19/12/2019, by
INCIBE (INCIBE)
5G ICS
Wireless networks are constantly evolving. As a result, 5G technology is born, continuing the roll-out of mobile phones and other associated services. This new technology is in an advanced stage of development and is already included in a multitude of next-generation devices. In fact, its deployment applied to mobile networks is already being done in numerous major cities in our country.
Etiquetas

Aurora vulnerability: origin, explanation and solutions

Posted on 26/09/2019, by
INCIBE (INCIBE)
Aurora_ICS
Perhaps, given the many important cybersecurity leaks and intrusions in recent years involving everything from social media accounts to critical infrastructure and classified military secrets, the attention paid to the Aurora vulnerability has not been proportional to its seriousness and systems affected. This is because it affects almost every electrical system in the world, and potentially any rotating equipment, whether it generates energy or is essential for an industrial or commercial installation. If the threat is so widespread, why isn’t the industry more worried and actively looking for solutions? From this article various possible reasons for this are given.

My industrial devices support LDAP, now what?

Posted on 19/09/2019, by
INCIBE (INCIBE)
Keyring
The main security standards and best practice guidelines in industrial cybersecurity include as a requirement the need for a user authentication system. The options involve implementations in each device of this system or being integrated into a centralised user authentication system. One of the most-used options is the use of the LDAP protocol, but there are a number of points to consider in the design phase, which are key when implementing a specific centralised user management system for industrial control systems, under LDAP.

The improvement of IIoT in industrial environments

Posted on 12/09/2019, by
INCIBE (INCIBE)
IoT
In recent years there has been an increase in interconnectivity between devices thanks to the Internet of Things (IoT). This has affected all sectors, including industry, which has been involved in an era of connectivity of industrial devices. This concept is known as the Industrial Internet of Things (IIoT).
Etiquetas