Home / Blog / Filter / Blog
Subscribe to CERTSI - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Threats
Problems in the industry

Mitigating availability problems in the industry

Posted on 07/19/2018, by INCIBE
Given that availability is always a critical point to take into account for within industrial environments, it is necessary to prevent the attacks that denial of services cause and that affect these environments. The means of giving way to a denial of service can be diverse, much like the means of mitigating these problems. This article will review all of these points, as well as the way in which the risks derived from these attacks can be reduced.
decorative image

Protective measures against denial-of-service (DoS) attacks

Posted on 01/26/2018, by Alejandro Fernández Castrillo
Denial-of-service attacks are a type of cyber-attack which consists on reducing or cancelling altogether the capacity of servers or other computing resources to provide service. A denial-of-service attack can occur in different scenarios, such as overloading online services by mass request sending or exploiting vulnerabilities of programs or services in order to suspend function totally or partially. In most of such attacks, attackers use a wide range of techniques and tools to hide their identities, which makes it especially challenging to find the culprits.
Riesgos y retos de ciberseguridad y privacidad en IoT

Cybersecurity and IoT Privacy Risks and Challenges

Posted on 12/26/2017, by Miriam Puente García
The Internet of Things (IoT) has started to become part of daily life in society: intelligent homes, intelligent education, intelligent healthcare, wearable devices, the Internet of Vehicles (IoV) and other industries make great use of this technology, with it playing a key role in the digital transformation and the hyper-connection of their elements.
Iniciativas y prácticas de seguridad para el IoT

Safety initiatives and best practices for IoT

Posted on 12/11/2017, by Miriam Puente García
Tomando en consideración las amenazas y los riesgos detallados anteriormente queda de manifiesto la necesidad de desarrollar acciones o modelos de protección para mitigar las vulnerabilidades que surgen del tratamiento de los datos de los usuarios así como prácticas de seguridad en la funcionalidad y el despliegue de tecnologías IoT.
Ensuring the virtualization of your control systems

Ensuring the virtualization of your control systems

Posted on 05/15/2017, by INCIBE
Virtualization is a technology that sooner or later will settle in the control systems, as was the case with corporate systems. The moment the impact that it may cause on the process is minimum and a proper security level may be guaranteed, it will be time to implement the virtualization of control systems.
Portada greatest hits 2016

Greatest Hits 2016

Posted on 01/23/2017, by Miguel Herrero (INCIBE)
El aim of Cybersecurity Highlights service is to gather all relevant news related to cybersecurity through the year. This is the article that summarizes those news that have been more important in 2016.

Pages