Imagen decorativa Avisos
Blog posted on 17/08/2023

External access provides great convenience to workers, as it allows them to access any industrial equipment deployed in the field from the office or even further away. However, this type of access can pose a number of security problems for the company. This article reviews the main problems and how to solve them.

Imagen decorativa Avisos
Blog posted on 22/06/2023

IDSs are passive elements that are in our network to ensure its security, but what would happen if all our communications were encrypted, or would this protection measure be enough to ensure that my network is protected? These questions and more will be discussed in the following article to provide solutions and advice focused on industrial environments.

Imagen decorativa Avisos
Blog posted on 15/06/2023

The Industrial Internet of Things (IIoT) has experienced considerable growth in recent years, providing crucial improvements. However, it also has some limitations in terms of consumption, security, cost or scalability. In this blog, we will see how the appearance of LoRaWAN in this area can solve part of those limitations.

Imagen decorativa Avisos
Blog posted on 04/05/2023

The growth of cyberattacks suffered in the industrial world is very worrying, since it is a sector that until recently the vast majority of its devices were not connected to the Internet, so the implementation of cybersecurity had never been thought of.
But with Industry 4.0 all that has changed, since almost all devices are interconnected or have Internet connection creating many advantages, but also some problem.
That is why experts in this field have seen the need to improve and implement cybersecurity in the industry, for this they have created different models and applications. Some of these can be seen in the following article.

Imagen decorativa Avisos
Blog posted on 23/03/2023

En este estudio, se expone brevemente el origen y evolución de la amenaza ransomware LockBit 3.0, a través del análisis de varias muestras maliciosa, con el objetivo de facilitar la información necesaria para poder identificar las características propias de este malware, su comportamiento y técnicas empleadas, permitiendo así una mejor identificación y respuesta ante ella.

Imagen decorativa Avisos
Blog posted on 20/03/2023

There are areas where the deployment of an industrial plant requires satellite communications such as those provided by VSAT (Very-Small-Aperture Terminal) technology. This technology allows the exchange of information through an antenna made up of different terminals, installed in remote locations with the connection capacity of a central hub, thanks to a satellite. Obviously, this technology has a cost that not all companies can afford, but it covers coverage needs in places where there are no other communication options. This type of communications is not only widespread in the industry, but its also sometimes used by banks to perform banking transactions at ATM’s. These communications are not so well known by many experts in the industrial sector, and it can be a good opportunity to bridge the knowledge gap so that readers can learn more about the advantages and disadvantages of VSAT communications.

Imagen decorativa Avisos
Blog posted on 16/03/2023

Energy efficiency alternatives are nowadays on everyone’s lips given the energy crisis that is plaguing the vast majority of European regions. In Spain, the energetic companies are following alternatives based on the use of different technologies to solve problems as complex as such as the management of surplus energy in some infrastructures. One of the alternatives that seems to have greater depth within the sector is the use of Virtual Power Plant (VPP). This new concept of energy management makes it possible to interweave different energy sources into a single flow of electricity demand, managed through a global solution that is usually deployed in the cloud due to the amount of data that has to be processed. The management system proposed by Virtual Power Plant is simple: Take advantage of surplus energy from microgrids to balance supplies to infrastructures that need this energy. With this gesture, large distributors can take advantage of up to almost 100% of the power within all infrastructures, such as electric vehicle chargers, solar farms, wind turbine farms, etc.

Imagen decorativa Avisos
Blog posted on 02/03/2023

Knowing the resources available when performing tasks of hardening a system, will allow us to optimize the time necessary to obtain a safer system. In addition, we have the possibility of using tools capable of auditing the system that identifies those configurations that are considered safe and which ones we could implement.

Imagen decorativa Avisos
Blog posted on 16/02/2023

The proliferation of cybersecurity incidents in industrial environments has given rise to a huge concern in the various existing sectors. Some of them, such us the energy sector, are choosing the path taking in the banking sector with the TIBER-EU framework. In addition, many governments are allocating large sums of money to their government agencies to develop strategic plans in which that exercises are included

Imagen decorativa Avisos
Blog posted on 11/01/2023

After the establishment of the cloud technology in industrial environments to provide processes a greater intelligence, new technological challenges arise that give rise to technical implementation solutions such as edge computing. This strategy makes it possible to extend cloud environments to different locations for processing collected data from the environment locally and immediately. An example of this new technological paradigm can be seen in modern manufacturing plants where sensors (IIoT) generate a constant flow of data to prevent breakdowns, improve operations, etc. Given that amount of data that can be generated, it is faster and more profitable to process the data in a close position from the equipment rather than transmitting It to a remote data center.