Home / Blog / Filter / Blog
Subscribe to CERTSI - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: IoT
Protect

Protect your DNS requests with DNS over TLS

Posted on 07/04/2019, by Ignacio Porro Sáez (INCIBE)
Security breaches that put our privacy at risk, leaks of our data, passwords... are incidents that happen more and more often. Protecting ourselves from these information leaks is often beyond our reach, but this does not mean that we should not try to take measures to protect our data. DNS-over-TLS can be very helpful in encrypting our communications, making them much more secure.
Events and conferences on industrial security

Events and conferences on industrial security

Posted on 07/26/2018, by INCIBE
Over the past few years, and especially after the arrival of the 4.0 industry, conferences, events and summits on industrial cybersecurity, and in general, all other topics related to industrial security and the IoT environment have been growing year upon year. This article will look at the main conferences on industrial cybersecurity both at national and international level.
Riesgos y retos de ciberseguridad y privacidad en IoT

Cybersecurity and IoT Privacy Risks and Challenges

Posted on 12/26/2017, by Miriam Puente García
The Internet of Things (IoT) has started to become part of daily life in society: intelligent homes, intelligent education, intelligent healthcare, wearable devices, the Internet of Vehicles (IoV) and other industries make great use of this technology, with it playing a key role in the digital transformation and the hyper-connection of their elements.
Iniciativas y prácticas de seguridad para el IoT

Safety initiatives and best practices for IoT

Posted on 12/11/2017, by Miriam Puente García
Tomando en consideración las amenazas y los riesgos detallados anteriormente queda de manifiesto la necesidad de desarrollar acciones o modelos de protección para mitigar las vulnerabilidades que surgen del tratamiento de los datos de los usuarios así como prácticas de seguridad en la funcionalidad y el despliegue de tecnologías IoT.
Beyond the Wall logo

Beyond the Wall

Posted on 06/07/2016, by Miguel Herrero (INCIBE)
The 'wildlings' live beyond the wall. Everyone in Westeros knows that. This is why they trust in the Night's Watch, protectors of the Seven Kingdoms. In the world of cybersecurity there are also people who live beyond the wall and we know that not all of them have evil intentions. They may not obey the laws but their intentions do not seem to be to destroy everything that is established by law.
camera

Physical security and cybersecurity go hand in hand: CCTV

Posted on 11/17/2015, by Daniel Fírvida (INCIBE)
In recent years different news has emerged linked to webcam and IP camera attacks, such as the vulnerabilities of any system, embedded credentials, and the most well-known, open cameras without a password... as well as many other examples. These security failures are not alien to more professional systems such as video recorders or DVRs and closed-circuit television or CCTV cameras. A few...

Pages