En esta sección se ofrecen contenidos de interés para los profesionales que conocen y auditan el cumplimiento legal y normativo en materia de ciberseguridad, la gestión de riesgos, la gestión y cumplimiento de políticas internas, o se encargan de la formación interna en ciberseguridad.

Threat analysis studies: Mekotio, FluBot, Cring and WannaMine

Posted on 15/04/2021, by
INCIBE (INCIBE)
Threat analysis studies image
Various studies with threat analysis or malware distribution campaigns affecting Spain and identified through incident management undertaken by INCIBE-CERT. The aim is to increase knowledge of the more technical details and characteristics of the threats so that organisations can implement appropriate detection and protection measures.

Secure remote access in ICS

Posted on 04/03/2021, by
INCIBE (INCIBE)
secure remote access in ICS
With the arrival of industry 4.0 to companies’ productive processes, including IIoT and Cloud, the need to control and monitor the ICS that remotely make them up arises. However, said access points should be established securely and in a controlled manner, mainly due to the criticality of these assets. This article discusses good practices, tools and methods that can be used to establish remote connections to OT networks as securely as possible.

RESIST: the ability of organizations to withstand disasters and disruptions from the digital realm

Posted on 10/09/2020, by
INCIBE (INCIBE)
RESIST: the ability of organizations to withstand disasters and disruptions from the digital realm
In this post we will explain the ability to resist, one of the 4 goals of the IMC model, which allows us to determine if an organization is capable of continuing with the essential services it provides, in the event of a cyberattack.

Security in the GOOSE protocol

Posted on 06/08/2020, by
INCIBE (INCIBE)
GOOSE
After the articles “IEC 61850 Standard, all for one and one for all” and “Multicast security in IEC 61850”, it is useful to add more information about the cybersecurity guidelines set out in the IEC 62351 standard with respect to the GOOSE protocol. An explanation will be made of the operation of the protocol, the weaknesses it presents and the appropriate security measures to protect it against possible attackers.

ANTICIPATING: one of the four goals of cyberresilience

Posted on 11/06/2020, by
INCIBE (INCIBE)
IMC ANTICIPATING
Anticipating is one of the four aims of cyberresilience. It consists of maintaining a state of informed readiness, in order to prevent essential services from being compromised in the event of a cyberattack. To measure the objectives of this aim, its three functional domains are analysed: cybersecurity policies, risk management and cybersecurity training.

Cyber-resilience: the key to overcoming incidents

Posted on 14/05/2020, by
INCIBE (INCIBE)
Cyber-resilience
The goal of cyber-resilience for an organization, whether or not it belongs to a strategic sector, whether or not it provides one of these digital services, is to maintain its primary purpose and integrity in the face of a cybersecurity threat or attack to an ideal level. Continuous detection processes must be established given that total prevention will never be guaranteed.

Secure use of communications and protocols at charging stations

Posted on 09/01/2020, by
INCIBE (INCIBE)
communications and protocols
Electric charging stations are increasingly used in urban furniture in cities. Electric cars and their need to be charged are a reality. Because of this, there is an increase in supply points that depend on specific protocols and communications for these stations.

The importance of the cybersecurity strategy for the industry

Posted on 22/08/2019, by
INCIBE (INCIBE)
cybersecurity strategy
The union of the IT and OT worlds is unstoppable, which means that the cybersecurity strategy, traditionally focused on the IT field, must now include aspects related to the industrial world. Having a good cybersecurity strategy is essential for IC systems to survive in this new era.

Measuring the severity of vulnerabilities: changes in CVSS 3.1

Posted on 01/08/2019, by
Hugo Rodríguez Santos (INCIBE)
CVSS3.1
The open and most-widely-used framework for communication and vulnerability scoring, the CVSS (Common Vulnerability Scoring System), has been updated, incorporating improvements in its new version 3.1 with respect to the previous one. This standard assesses the severity of computer systems vulnerabilities and assigns them a score of 0 to 10.

Cybersecurity standards at sea

Posted on 11/07/2019, by
INCIBE (INCIBE)
Sea
Trips across the ocean have changed over the years with the arrival of the industrial revolution and information technology, among other things, making technology its best ally, both to automate their navigation and to control their location from land-based stations. However, this total dependence on technology brings with it important security issues that need to be addressed with the importance they deserve.