Blog

Contenido Blog

Measuring the severity of vulnerabilities: changes in CVSS 3.1

Posted on 01/08/2019, by
Hugo Rodríguez Santos (INCIBE)
CVSS3.1
The open and most-widely-used framework for communication and vulnerability scoring, the CVSS (Common Vulnerability Scoring System), has been updated, incorporating improvements in its new version 3.1 with respect to the previous one. This standard assesses the severity of computer systems vulnerabilities and assigns them a score of 0 to 10.

Real-Time Operating Systems, hardening and functioning

Posted on 25/07/2019, by
INCIBE (INCIBE)
Reloj
ICS environments are made up of very heterogeneous machines, with large differences depending on the system we are dealing with. Some of these systems have very strict response time requirements for their correct operation and therefore use real-time operating systems. Throughout this article we will see what real-time operating systems are, how they work, and we will propose hardening measures to reduce the likelihood that these devices will suffer a cyberattack.

Industrial CVSS: alternative calculations for different needs

Posted on 23/07/2019, by
INCIBE (INCIBE)
CVSS_SCI
Over time, different communities of experts related to the world of industrial cybersecurity have realised the challenge of calculating the CVSS (Common Vulnerability Score System) for vulnerabilities in industrial environments. This article aims to show the alternatives proposed by experts, such as RSS-MD, TEMSL and IVSS in order to correctly calculate their severity in the industrial environment.
Etiquetas

Cybersecurity standards at sea

Posted on 11/07/2019, by
INCIBE (INCIBE)
Sea
Trips across the ocean have changed over the years with the arrival of the industrial revolution and information technology, among other things, making technology its best ally, both to automate their navigation and to control their location from land-based stations. However, this total dependence on technology brings with it important security issues that need to be addressed with the importance they deserve.

Protect your DNS requests with DNS over TLS

Posted on 04/07/2019, by
Ignacio Porro Sáez (INCIBE)
Protect
Security breaches that put our privacy at risk, leaks of our data, passwords... are incidents that happen more and more often. Protecting ourselves from these information leaks is often beyond our reach, but this does not mean that we should not try to take measures to protect our data. DNS-over-TLS can be very helpful in encrypting our communications, making them much more secure.

Emerging Threats to Industrial Control Systems

Posted on 23/08/2018, by
INCIBE (INCIBE)
Over recent years we have witnessed how industrial controls systems are not exempt from being targeted for cyberattacks. In this article we look back at threats detected in recent years to see how we can defend ourselves against them.
Etiquetas

Active defence and intelligence: from theory to practice

Posted on 02/08/2018, by
INCIBE (INCIBE)
active defense
The concept of defence in industrial environments is changing. Just as the attacks are increasingly more sophisticated, the protection systems tend to be more flexible and more evolved. Being able to strengthen the upper levels, such as active defence and intelligence, is essential, whilst always maintaining a solid base of the lower levels (passive defence and secure architecture).
Etiquetas

Events and conferences on industrial security

Posted on 26/07/2018, by
INCIBE (INCIBE)
decorative image
Over the past few years, and especially after the arrival of the 4.0 industry, conferences, events and summits on industrial cybersecurity, and in general, all other topics related to industrial security and the IoT environment have been growing year upon year. This article will look at the main conferences on industrial cybersecurity both at national and international level.