Home / Blog / Filter / Blog
Subscribe to INCIBE-CERT - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Cloud computing
hand edge computing

Edge computing the future in computation

Posted on 01/11/2023, by INCIBE
After the establishment of the cloud technology in industrial environments to provide processes a greater intelligence, new technological challenges arise that give rise to technical implementation solutions such as edge computing. This strategy makes it possible to extend cloud environments to different locations for processing collected data from the environment locally and immediately. An example of this new technological paradigm can be seen in modern manufacturing plants where sensors (IIoT) generate a constant flow of data to prevent breakdowns, improve operations, etc. Given that amount of data that can be generated, it is faster and more profitable to process the data in a close position from the equipment rather than transmitting It to a remote data center.
Cybersecurity measures from a global perspective

Cybersecurity measures from a global perspective

Posted on 03/11/2022, by INCIBE
An adequate level of cybersecurity and cyberresilience is essential to keep assets safe from possible cyberattacks. This is why INCIBE-CERT has listed a set of measures and good practices that are valid for any need that affects cybersecurity.
secure remote access in ICS

Secure remote access in ICS

Posted on 03/04/2021, by INCIBE
With the arrival of industry 4.0 to companies’ productive processes, including IIoT and Cloud, the need to control and monitor the ICS that remotely make them up arises. However, said access points should be established securely and in a controlled manner, mainly due to the criticality of these assets. This article discusses good practices, tools and methods that can be used to establish remote connections to OT networks as securely as possible.
decorative image

Protective measures against denial-of-service (DoS) attacks

Posted on 01/26/2018, by Alejandro Fernández Castrillo
Denial-of-service attacks are a type of cyber-attack which consists on reducing or cancelling altogether the capacity of servers or other computing resources to provide service. A denial-of-service attack can occur in different scenarios, such as overloading online services by mass request sending or exploiting vulnerabilities of programs or services in order to suspend function totally or partially. In most of such attacks, attackers use a wide range of techniques and tools to hide their identities, which makes it especially challenging to find the culprits.
Let’s Encrypt: The democratisation of SSL certificates

Let’s Encrypt: The democratisation of SSL certificates

Posted on 02/02/2016, by Antonio Rodríguez (INCIBE)
There are still a great number of websites that do not use SSL/TLS certificates to encrypt their connections; this has been a problem in web communications security for years. There are various reasons for this; however, perhaps the most important is the fact that historically, having an SSL certificate was unviable economically, particularly for personal websites, SMEs, or small online shops...
Cloud security architectures in industry

Cloud security architectures in industry

Posted on 12/09/2015, by INCIBE
Processes and cycles are different in Industry than in other sectors and it also integrates technology at a more leisurely pace, owing to its functional characteristics. Next Generation Networks (NGNs) based in the Cloud are no exception. This article will discuss the architectures to be used in industry, as well as the security that must come with them.
Applications are growing

Control applications are growing

Posted on 11/10/2015, by INCIBE
Control system applications have adapted and evolved, both in terms of changes to base software (operating system) and devices. Seizing on this need for change, applications have also adapted, and can now work online and share information in the cloud.
industrial cloud

My SCADA in the cloud

Posted on 11/03/2015, by INCIBE
Like their corporate counterparts, industrial systems are constantly evolving in order to become more competitive. One of the improvements taking place in these environments at the moment is the reduction of costs through the use of cloud technology.
Thum

Click fraud - a highly lucrative business

Posted on 07/28/2015, by INCIBE
Various studies have indicated that bots currently constitute over half of all global Internet traffic. Certain reports, such as "The 2015 Bad Bot Landscape Report" released by Distil Networks, Inc, even divide traffic into legitimate and malicious traffic, concluding that the latter is growing at an alarming rate. The boom that Cloud Computing has experienced in recent times has been one of...

Pages