BLOG
Cybersecurity and Smart Networks: Core Pillars of Transport Infrastructure
In an increasingly interconnected world, where digitalization is profoundly transforming the way in which transport systems are managed and operated, cybersecurity has become a critical component to ensure continuity, security, and efficiency. From urban bus fleets to high-speed trains and global logistics systems, the dependency on digital technologies calls for a...
Kategorien
Artificial Intelligence with Machine Learning and Deep Learning applied to Cybersecurity
Artificial Intelligence - AI and cybersecurity are two terms that are becoming increasingly popular in today's digital age. While AI refers to the simulation of human intelligence in machines that are capable of performing tasks such as learning, decision making, and...
The benefits of wireless connectivity
The emergence of compact wireless routers promises to optimize the deployment of distributed locations for different sorts of businesses. As a result of developments in wireless technology, two widely used concepts appeared in the telecommunications sector related to...
Should my company migrate to SD-WAN?
The world of corporate telecommunications is undergoing a technological transformation. We have gone from connecting branch office networks through expensive circuits (to ensure users have access to data center-hosted applications) to scenarios where people and...
5G Challenges in Smart Grid Electrical Distribution Networks
The world and Europe are currently experiencing a context of climate emergency, energy scarcity and electrification of energy consumption. In this environment, electricity distribution networks face a challenge of continuous improvement with a focus on more efficient...
OT cybersecurity in critical infrastructures
Now that mass and social media are booming, it is normal for marketing to take over and for technological terms to become more trivialized and popular. We are all familiar with cloud computing, now linked to edge computing, blockchain, the metaverse, AI, etc. However,...
Zero Trust Approach and Unified Cloud Security
Introduction In the new paradigm of the connected world, where everything and everyone has access to the Internet, having a totally secure network is difficult to imagine. Today we see how digitization is advancing rapidly, within education, health and government,...
The role of communications in the automation and remote control of distribution networks
Electric distribution companies have tens of thousands of transformation centers that perform the function of distributing electric power, taking meter readings from supply points, and that are responsible for maintaining and ensuring all the elements involved operate...
VoIP and the benefits it can bring
The term VoIP is an acronym for Voice over Internet Protocol, which means voice over the Internet. It is the technology used to deliver voice and multimedia sessions (such as video) via an Internet Protocol (IP). VoIP phones are therefore physical devices or computer/mobile software designed to transmit voice over the Internet. This allows audio signals from a standard telephone to be converted..
Cyber security in the Railways Industry
Cybersecurity has become a real trendy world in everybody’s live either used as a fancy term, to generate confidence associated to high technology topics, or to create panic and generate that sense of fear and urge for protection. We can find this uncomfortable…
Why the cybersecurity threat to banks has so significantly increased
Bank ATM cashpoint machines have always been prime targets for both physical and cyber threats for obvious reasons; they contain large amounts of cash and sensitive customer information. Yet, as the growth in hybrid working and migration to cloud applications has…
MTBF and hardware reliability
This year’s University Entrance Exam (EVAU) for physics in Madrid included a question on atomic decay..
The difficulty could lie not so much in physical concepts as in statistics, and with an equation as simple and seemingly innocent as the exponential: This equation
Ensuring cybersecurity for healthcare research data
In the wake of the pandemic, nations worldwide are seeking a return to good public health and economic recovery. Any such return can be critically aided by an adequate supply of vaccines which can be administered to millions of people without a hitch. However, the...


































