Imagen decorativa Avisos
Blog posted on 08/03/2018

In recent years, indicators of compromise have become the best way of exchanging information when it comes to managing an incident. But, do we really know how to manage an indicator of compromise? The aim of an indicator of compromise is to map the information that is received or extracted during the analysis of an incident. This is done in such a way that it can be reused by other investigators or affected people, in order to discover the same evidence in their systems and to be able to determine if they have been compromised or not.

Imagen decorativa Avisos
Blog posted on 23/11/2017

The protection of critical and strategic infrastructures in our country is a task that must be tackled by all the agents involved in a public-private cooperation framework.

Imagen decorativa Avisos
Blog posted on 09/11/2017

The IDS, IPS and SIEM are equipment originally designed for IT environments but whose adaptation to TO environments has been forced in recent years due to a proliferation of attacks on industrial environments.

Imagen decorativa Avisos
Blog posted on 28/09/2017

Wireless technologies are becoming more and more prominent everywhere, and also in industrial environments, driven by all other environments where the use of wireless communication technologies is widespread.

Imagen decorativa Avisos
Blog posted on 03/03/2017

New control methods of energy distribution needs have required new communication ways, which have been many tines solved with new protocols. A security review to avoid unauthorized Access to private information is one task of main power companies.