Home / Blog / Filter / Blog
Subscribe to CERTSI - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Cloud computing
decorative image

Protective measures against denial-of-service (DoS) attacks

Posted on 01/26/2018, by Alejandro Fernández Castrillo
Denial-of-service attacks are a type of cyber-attack which consists on reducing or cancelling altogether the capacity of servers or other computing resources to provide service. A denial-of-service attack can occur in different scenarios, such as overloading online services by mass request sending or exploiting vulnerabilities of programs or services in order to suspend function totally or partially. In most of such attacks, attackers use a wide range of techniques and tools to hide their identities, which makes it especially challenging to find the culprits.
Let’s Encrypt: The democratisation of SSL certificates

Let’s Encrypt: The democratisation of SSL certificates

Posted on 02/02/2016, by Antonio Rodríguez (INCIBE)
There are still a great number of websites that do not use SSL/TLS certificates to encrypt their connections; this has been a problem in web communications security for years. There are various reasons for this; however, perhaps the most important is the fact that historically, having an SSL certificate was unviable economically, particularly for personal websites, SMEs, or small online shops...
Cloud security architectures in industry

Cloud security architectures in industry

Posted on 12/09/2015, by INCIBE
Processes and cycles are different in Industry than in other sectors and it also integrates technology at a more leisurely pace, owing to its functional characteristics. Next Generation Networks (NGNs) based in the Cloud are no exception. This article will discuss the architectures to be used in industry, as well as the security that must come with them.
Applications are growing

Control applications are growing

Posted on 11/10/2015, by INCIBE
Control system applications have adapted and evolved, both in terms of changes to base software (operating system) and devices. Seizing on this need for change, applications have also adapted, and can now work online and share information in the cloud.
industrial cloud

My SCADA in the cloud

Posted on 11/03/2015, by INCIBE
Like their corporate counterparts, industrial systems are constantly evolving in order to become more competitive. One of the improvements taking place in these environments at the moment is the reduction of costs through the use of cloud technology.
Thum

Click fraud - a highly lucrative business

Posted on 07/28/2015, by INCIBE
Various studies have indicated that bots currently constitute over half of all global Internet traffic. Certain reports, such as "The 2015 Bad Bot Landscape Report" released by Distil Networks, Inc, even divide traffic into legitimate and malicious traffic, concluding that the latter is growing at an alarming rate. The boom that Cloud Computing has experienced in recent times has been one of...
Study of the security in cloud storage services

Study of the security in cloud storage services: Analysis of Dropbox and Mega

Posted on 01/27/2015, by Jesús Díaz (INCIBE)
Cloud storage services are receiving increasing popularity. But, how to choose among al the available alternatives? In this study, the main factors affecting security are described, creating a common framework for their analysis. Subsequently, these principles are applied for analyzing two of the main current solutions: Dropbox and Mega.
EC3_logo

The Internet Organised Crime Threat Assessment (iOCTA) by EC3

Posted on 12/16/2014, by María José Santos (INCIBE)
On the 29th of September of 2014, the European Cybercrime Centre (E3C) at Europol published a report known as "The Internet Organised Crime Threat Assessment (iOCTA)", which provides recommendations on how to act to dissuade crimes committed over electronic communication networks and how to fight against cybernetic threats. The report studies the distinguishing aspects of cybercrime with...