Blog

Contenido Blog

What is the cyber security level of my value chain?

Posted on 30/03/2017, by
INCIBE (INCIBE)
What is the cyber security level of my value chain?
As explained in the first post of this series dedicated to the C4V model, the cyber security level of outsourced services is key to assess the cyber security capabilities of any organisation: It is no use increasing the cyber security levels of an organisation if their suppliers’ levels are not as high, because -it goes without saying that- "security is as strong as its weakest link".

Industrial Honeypots

Posted on 23/03/2017, by
INCIBE (INCIBE)
Honeypots industriales
The increasing number of attacks to industrial networks forces us to analyse their behaviour so that we can implement measures to mitigate said attacks. One of the options used to learn about the behaviour of attacks is the deployment of honeypots. This article deals with the advantages and challenges of this technology when used in industrial environments.

Managing Provider Risk as a Priority

Posted on 09/03/2017, by
INCIBE (INCIBE)
Managing Provider Risk as a Priority
The outsourcing of processes is not something we can consider new. In fact, the contrary is true. And in particular, in terms of how it applies to ICT (Information and Communication Technology), it is common for at least part of our systems to be accessed by third parties or managed directly by third parties.

Features and security in PROFINET

Posted on 16/02/2017, by
INCIBE (INCIBE)
Features and security in PROFINET
The use of Ethernet communications in different automation systems along with the increase in IT standards in the industrial world are bringing the worlds of IT and OT ever closer, both at a technological and communication level. From this convergence emerge communication standards like PROFINET, which we shall analyse in this article.
Etiquetas

Network Analyzers in Control Systems

Posted on 10/02/2017, by
INCIBE (INCIBE)
The security of a system is fundamentally based on knowledge of the communications developed therein. For this reason, network analyzers are indispensable elements that allow us to identify the information exchanged between elements and discover relevant information, such as erroneous implementations of the stack of some protocols, possible information leaks, non-defined communications, etc.
Etiquetas