Home / Blog / Filter / Blog
Subscribe to CERTSI - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Vulnerability
cryptographic web protocols

2014: The toughest year for cryptographic web protocols

Posted on 12/30/2014, by Santiago González (INCIBE)
Security errors SSL (along with its TLS evolution) is the most used cryptographic protocol in its different implementations to guarantee the confidentiality of communications on Internet. This is achieved by ciphering, via asymmetrical cryptography algorithms, the communications between the client (usually the user’s web browser) and the server it gains access to. When a website is shown using...
Cybercamp logo

Cybercamp Security Challenges

Posted on 10/31/2014, by INCIBE
Among the activities INCIBE has organised for the CyberCamp event to find new cyber-security talents are a wide range of Security Challenges which you can take part in to find out what it is that really fires your inspiration. The challenges are made up of two stages, one online and the other at the event itself. You can take part in the online stage, which will be open from 7 to 16 November ...
Cybercamp logo

CyberCamp: Show off Your Potential

Posted on 10/27/2014, by INCIBE
One of the activities included in the Plan for Trust in Digital Life (Plan de Confianza en el Ámbito Digital) is the celebration of an event aimed at focusing the interest of all audiences towards this discipline, so important in our daily lives. The venue, organised by INCIBE will take place from 5 to 7 December, 2014, and will be held in the Pabellón Multiusos I of Madrid. As we want this...
Fingerprint

The issue of biometrics as an authentication method

Posted on 09/25/2013, by Antonio Rodríguez (INCIBE)
With the announcement of the new fingerprint sensor in the latest smartphone from Apple, the iPhone 5S, biometric sensors are again under scrutiny among information security professionals. Especially because the use of these technologies is becoming popular for consumer grade electronics, and its use use could become ubiquitous for something made to protect sensitive data, like information...

Pages