Blog
Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Incident
Aurora vulnerability: origin, explanation and solutions
Perhaps, given the many important cybersecurity leaks and intrusions in recent years involving everything from social media accounts to critical infrastructure and classified military secrets, the attention paid to the Aurora vulnerability has not been proportional to its seriousness and systems affected. This is because it affects almost every electrical system in the world, and potentially any rotating equipment, whether it generates energy or is essential for an industrial or commercial installation.
If the threat is so widespread, why isn’t the industry more worried and actively looking for solutions? From this article various possible reasons for this are given.
Emerging Threats to Industrial Control Systems
Over recent years we have witnessed how industrial controls systems are not exempt from being targeted for cyberattacks. In this article we look back at threats detected in recent years to see how we can defend ourselves against them.
Mitigating availability problems in the industry
Given that availability is always a critical point to take into account for within industrial environments, it is necessary to prevent the attacks that denial of services cause and that affect these environments. The means of giving way to a denial of service can be diverse, much like the means of mitigating these problems.
This article will review all of these points, as well as the way in which the risks derived from these attacks can be reduced.
Monitoring Networks and Events in SCIs: more Information, more Security
Advances in security within control systems have brought us many of the security tools and services offered in IT for this environment. Until now, protection was based on reactive measures, acting only where there was evidence of the attack, but this trend changed with deployment of monitoring and the proactive defensive actions that this can provide.
The value of commitment indicators in industry
In recent years, indicators of compromise have become the best way of exchanging information when it comes to managing an incident. But, do we really know how to manage an indicator of compromise? The aim of an indicator of compromise is to map the information that is received or extracted during the analysis of an incident. This is done in such a way that it can be reused by other investigators or affected people, in order to discover the same evidence in their systems and to be able to determine if they have been compromised or not.
Tags:
2017 Greatest Hits: Problems seeded in the past
The aim of Cybersecurity Highlights service is to gather all relevant news related to cybersecurity through the year. This is the article that summarizes those news that have been more important in 2017.
Insider, the two faces of the employee
Companies usually spend a large share of their budgets to improve the security of their systems assuming that attacks comes from outside of their networks. But, what if the attack comes from within?
Emerging Threats in Industrial Sectors: Ransomware
Last year ransomware became the threat most widely used by attackers to monetise their actions. This fact has also affected industrial sectors which, to a greater or lesser extent, have suffered this type of malware.