Home / Blog / Filtro / Blog
Subscribe to CERTSI - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
NTP, SNTP and PTP

NTP, SNTP and PTP: what time synchronization do I need?

Posted on 03/05/2020, by INCIBE
Time synchronization in industrial devices is a critical factor. In terms of time, industrial processes and the programming logic of industrial devices have specific needs. These may require specific accuracy that determines the need to use one protocol or another, as well as dependencies on cost or on the network infrastructure itself. Explaining the main differences is key when using one or another in industrial infrastructures. Just as each protocol has different nuances, there are certain differences to be taken into account within security.
Modbus decorative image

Evolving towards secure Modbus

Posted on 02/20/2020, by INCIBE
The Modbus protocol, in its TCP version, was not developed with cybersecurity capabilities in its communications. For this reason, many researchers have studied the different possibilities that could be undertaken at the technical level to incorporate a security layer in it, giving rise to a new version of Modbus/TCP called secure Modbus/TCP, which will gradually begin to be implemented in industrial communications.
station

Safety recommendations for electric vehicle charging stations

Posted on 02/06/2020, by INCIBE
Over the last few years we have seen how electric vehicles have experienced a boom in terms of their development and retail and, along with them, the deployment of their charging points. In this article we will discuss a series of requirements, in terms of security, that should be implemented in these charging stations in order to ensure their security.
5G ICS

5G for the new connected industry

Posted on 12/19/2019, by INCIBE
Wireless networks are constantly evolving. As a result, 5G technology is born, continuing the roll-out of mobile phones and other associated services. This new technology is in an advanced stage of development and is already included in a multitude of next-generation devices. In fact, its deployment applied to mobile networks is already being done in numerous major cities in our country.

Pages