Otros posts con Etiqueta: IoT Security

post image

Vulnerabilidades en el entorno industrial. La crisis de la ciberseguridad industrial

agosto 26th, 2021 by

¿Qué diferencia el mundo industrial (OT) del mundo informático (IT) y por qué cada vez la sensación de inseguridad es más alta en las empresas industriales? La respuesta está en la incapacidad de las empresas industriales en actualizar software y firmware.

post image

IoT Security: how to protect edge devices to minimise cyber attacks

agosto 9th, 2021 by

IoT security is one of the biggest concerns for those responsible for innovation and digital transformation in large organizations. It is especially relevant in companies with critical assets such as electricity, water utilities, transportation, oil and gas due to their impact beyond business.

post image

Seguridad IoT: cómo proteger los dispositivos y minimizar los ciberataques

junio 30th, 2021 by

La seguridad en IoT es una de las mayores preocupaciones que tienen los responsables de innovación y transformación digital de las grandes empresas. Es especialmente relevante en empresas industriales de sectores críticos por su impacto sobre la sociedad, como el Eléctrico, el del Gas o el del Agua.

post image

IoT en el sector energético: las claves para una gestión segura

febrero 12th, 2021 by

Las empresas eléctricas son blanco de ciberataques cada vez con mayor frecuencia. ¿Cómo asegurar la infraestructura tecnológica frente a posibles riesgos?

post image

Blockchain and IoT: a tandem for security

junio 5th, 2019 by

Blockchain has several applications and that’s why it seems to make sense that IoT and Blockchain take advantage of each other

post image

What to consider when choosing hardware for an IoT deployment?

marzo 28th, 2019 by

The opportunity offered by the IoT is as great as the challenge posed by IoT security. The latter no longer depends only on the software we use, but also the hardware that we have.

post image

Why IoT Security is a hot topic?

enero 30th, 2019 by

The IoT arises from the possibility of connecting all types of devices to a network to collect data and analyze them. It is precisely this ability to open to the network what makes the devices somewhat vulnerable, as they become accessible remotely.