Imagen decorativa Avisos
Blog posted on 13/06/2024

The UN R155 and UN R156 regulations are of vital importance for vehicle cybersecurity. From July 2022, all car manufacturers that want to be type-approved must comply with both regulations, but from July 2024 this requirement will be extended to all new vehicles sold in the European Union, regardless of when the manufacturer obtained type-approval. One of the most important aspects of compliance with both regulations is the completion of a cybersecurity risk assessment of the vehicle, including all integrated components of the vehicle's supply chain. On the other hand, it also specifies how to incorporate cybersecurity from design, how to detect and respond to incidents, how to securely update vehicle software, etc. 

Imagen decorativa Avisos
Blog updated on 20/06/2024

En la actualidad, el crecimiento de las plantas industriales ha provocado una incesante búsqueda en la mejora de la productividad de los procesos industriales. Esto ha llevado a la evolución de los dispositivos IIoT y, con ello, la emergencia de las pasarelas ICS. Estas se han postulado como puentes tecnológicos, tendiendo vínculos, puentes, entre los dispositivos instalados y la inmensidad de los entornos cloud. En este artículo descubrirás el papel central de estas pasarelas, descubriendo su función como facilitadoras esenciales en la convergencia de la ingeniería tradicional y la innovación en la nube.

Imagen decorativa Avisos
Blog updated on 06/06/2024

Technology adoption in industrial plants is part of the global digital transformation. This evolution provides greater knowledge of all the elements that interact in industrial processes, but it can also incorporate cybersecurity issues if a series of good practices are not followed. The development of this article focuses on the problems introduced by Wi-Fi communications and their growth in industrial environments.

Imagen decorativa Avisos
Blog updated on 12/08/2021

This post presents some lines of action that should be followed to deal with a DrDoS cyberattack based on the PortMapper protocol, describing in detail the prevention, identification and response phases to follow.

Imagen decorativa Avisos
Blog updated on 25/06/2021

This post presents some lines of action that should be followed to deal with a DrDoS cyberattack based on the LDAP protocol, describing in detail the prevention, identification and response phases to follow.

Imagen decorativa Avisos
Blog updated on 17/02/2022

This post presents some lines of action that should be followed to deal with a DrDoS cyberattack based on the QOTD protocol, describing in detail the prevention, identification and response phases to follow.

Imagen decorativa Avisos
Blog updated on 11/11/2021

This post presents some lines of action that should be followed to deal with a DrDoS cyberattack based on the SSDP protocol, describing in detail the prevention, identification and response phases to follow.

Imagen decorativa Avisos
Blog updated on 31/05/2024

En este post se presentan algunas líneas de actuación que deben seguirse para hacer frente a un ciberataque DrDoS basado en el protocolo CharGEN, describiendo detalladamente las fases de prevención, identificación y respuesta a adoptar.

Imagen decorativa Avisos
Blog posted on 30/05/2024

En la actualidad, el sector industrial se ha convertido en uno de los blancos más frecuentes de los ciberdelincuentes. Convirtiendo el cibercrimen en uno de los principales riesgos del sector, ya que el objetivo preferido en las redes industriales son los equipos críticos que desempeñan un papel fundamental en el sistema. Por tanto, en este artículo, exploraremos las distintas fases y formas de un ciberincidente en un entorno industrial, para entender el riesgo que representan y como prevenirlos.

Imagen decorativa Avisos
Blog posted on 09/05/2024

Space is an increasingly important element in the critical infrastructures of all countries. The possibility of losing or degrading space services can significantly affect both national security and all customers who have contracted services involving the use of satellites or any other space devices, resulting in major economic and security losses.

To protect it, the National Institute of Standards and Technology (NIST) has developed a cyber security framework for the commercial ground segment of the space sector, providing a means for stakeholders to assess their cyber security posture in terms of identification, protection, detection, response and recovery operations, thereby evaluating the level of risk to the satellite ground segment structure.