Home / Blog / Filter / Blog
Subscribe to CERTSI - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Studies & stats
Cover commitment in the industry

The value of commitment indicators in industry

Posted on 03/08/2018, by INCIBE
In recent years, indicators of compromise have become the best way of exchanging information when it comes to managing an incident. But, do we really know how to manage an indicator of compromise? The aim of an indicator of compromise is to map the information that is received or extracted during the analysis of an incident. This is done in such a way that it can be reused by other investigators or affected people, in order to discover the same evidence in their systems and to be able to determine if they have been compromised or not.
Logjam

Logjam and other vulnerabilities in Spanish domains

Posted on 08/11/2015, by Santiago González (INCIBE)
After the discovery of several vulnerabilities associated related to the SSL/TLS protocol in 2014 and the first trimester of 2015, in the middle of last May “Logjam”, was disclosed, a new vulnerability that affects the security of Internet communications. Let's analyze its impact in Spanish domains
What is a correlation? And data analysis tools

What is a correlation? And data analysis tools

Posted on 07/09/2015, by Héctor R. Suárez (INCIBE)
When information of a dataset are analysed, whose origin or “feed” may be a database, information of raw files, logs, spreadsheet data, etc. one of the most powerful tools for drawing conclusions is to carry out correlations. In the post “The importance of language, binary diffing and other “One Day” stories”, we highlighted that the term “correlation” has begun to be heard frequently. However,...
Study of the security in cloud storage services

Study of the security in cloud storage services: Analysis of Dropbox and Mega

Posted on 01/27/2015, by Jesús Díaz (INCIBE)
Cloud storage services are receiving increasing popularity. But, how to choose among al the available alternatives? In this study, the main factors affecting security are described, creating a common framework for their analysis. Subsequently, these principles are applied for analyzing two of the main current solutions: Dropbox and Mega.