Home / Blog / Filter / Blog
Subscribe to INCIBE-CERT - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Identity management
Cybersecurity measures from a global perspective

Cybersecurity measures from a global perspective

Posted on 03/11/2022, by INCIBE
An adequate level of cybersecurity and cyberresilience is essential to keep assets safe from possible cyberattacks. This is why INCIBE-CERT has listed a set of measures and good practices that are valid for any need that affects cybersecurity.
Ransomware: preventive measures (I)

Ransomware: preventative measures (I)

Posted on 09/21/2021, by INCIBE
Cyberattacks using ransomware are one of the main threats for companies all over the world, and Spain is the tenth most affected country. This article, the first in a series dedicated to this subject, will provide a detailed list of recommendations for preventative measures dedicated to hardening in order to deal with such attacks.
secure remote access in ICS

Secure remote access in ICS

Posted on 03/04/2021, by INCIBE
With the arrival of industry 4.0 to companies’ productive processes, including IIoT and Cloud, the need to control and monitor the ICS that remotely make them up arises. However, said access points should be established securely and in a controlled manner, mainly due to the criticality of these assets. This article discusses good practices, tools and methods that can be used to establish remote connections to OT networks as securely as possible.
INCIBE-CERT technical webinars

INCIBE-CERT technical webinars

Posted on 09/24/2020, by INCIBE
With the aim of increasing cybersecurity knowledge, INCIBE-CERT has published a series of webinars in video format, so that, in a light and entertaining way, knowledge and technical aspects of cybersecurity can be expanded in various areas of interest, for both INCIBE-CERT's technical audience and anyone interested in cybersecurity.
Keyring

My industrial devices support LDAP, now what?

Posted on 09/19/2019, by INCIBE
The main security standards and best practice guidelines in industrial cybersecurity include as a requirement the need for a user authentication system. The options involve implementations in each device of this system or being integrated into a centralised user authentication system. One of the most-used options is the use of the LDAP protocol, but there are a number of points to consider in the design phase, which are key when implementing a specific centralised user management system for industrial control systems, under LDAP.
Internet users

Web tracking of the Internet users

Posted on 12/01/2015, by Antonio López (INCIBE)
Nowadays, data obtained through the identification and tracking of Internet users have a great value to achieve different objectives. Online sales, advertising campaigns, social studies and personal tracking are some of the motivations behind the information extracted by web tracking techniques. the web tracking. This article will discuss about these techniques.
Biometrics

Biometrics and dynamic authentication

Posted on 06/10/2015, by Antonio López (INCIBE)
In the world of information technology, achieving a status of total security is a goal that is practically impossible. In particular, one of the most persistently sought objectives is to find authentication and identification methods that come close to this total security utopia. Can biometrics bring progress in this issue?