Home / Blog / Filter / Blog
Subscribe to CERTSI - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Threats
Atrapando sombras en la industria

Hunting shadows in Industry

Posted on 11/03/2016, by INCIBE
In the same way that a known character or image is reflected within an industry by feigning a happy face, advanced persistent threats exist and are often camouflaged through the phenomenon of pareidolia (they resemble something else) within industrial networks. But how can we spot these threats? And, above all, is it possible to pre-empt their malicious intentions?
Cyber Kill Chain

Cyber Kill Chain applied to ICS

Posted on 10/27/2016, by INCIBE
The process of fulfilling an attack implies many previous stages before arriving to the visible stage of the attack, that is, to the moment when the security of a system, company or industry is compromised. The cyber kill chain describes all those previous stages and establishes preventive actions for each of them.
Information Sharing

United Against Cyberthreats: Information Sharing

Posted on 10/06/2016
The well known motto "there is strength in numbers" perfectly describes the beneficial situation that involves collaboration and knowledge sharing on cyber threats. The concept of Information Sharing bring to us the idea of ​​establishing methods to share and take full benefit of the gathered knowledge among all actors. Among these partners, CERT and security companies play a key role in defining consensus documentation and the pathway for sharing knowledge effectively.

Pages