BLOG
What is the CCN and how does it relate to the ENS, the CPSTIC Catalog, and cybersecurity products?
In Spain, public-sector cybersecurity is structured around several key concepts: the National Cryptology Center (CCN), the National Security Framework (ENS), the CPSTIC Catalog, and the Qualified and Approved cybersecurity products listed within it. Although closely interconnected, each plays a distinct role within Spain’s public information security ecosystem. This...
Kategorien
Main cybersecurity threats for SMEs – Cyberattacks
For the production fabric in general and for Spain in particular, SMEs play an important role. According to CEPYME (Spanish SMEs business organization), companies with 10 to 49 workers have had a very high employment generation rate in recent years and are now...
Choosing an SD-WAN Solution Model: Cloud vs On-Premise
Large and medium-sized companies have been implementing SD-WAN solutions for some years now, and recent studies confirm that the SD-WAN market is still booming. According to a report by the IDC, the market will grow by about 19% annually until 2025. There are several...
Railway hardware standards and certifications
Railway vehicle manufacturers, suppliers and rolling stock operating companies are required to meet mandatory, voluntary and contractual requirements for the construction, commissioning and operation of rolling stock and components. Rail testing companies provide...
Easy network deployment with Corporate ZTP
Zero Touch Provisioning is a method that can be implemented in different types of businesses, whereby the implementation of some technological parts of their limited ecosystem is optimally solved through the use of automated processes generally based on software and...
Limitations of Traditional Cybersecurity Solutions
Traditional cybersecurity solutions, such as firewalls and antivirus software, have been the mainstay of cybersecurity for decades. However, these solutions are becoming less effective in the face of more sophisticated cyber threats. One of the main limitations of...
The Rail Industry in the EU: Towards digitalization
When it comes to transportation, the train represents a symbol of pride for many European countries, reflecting the progress of industrial development and the engine of passenger mobility. As an example, the EU demand for passenger transport increased by around 10%...
The importance of Network Traffic Analysis – NTA tools in implementing cybersecurity in companies
Network Traffic Analysis - NTA tools and cybersecurity are two key areas of IT security. Both are essential to protect an organization’s systems and data. This article will discuss the importance of NTA tools and how they can help improve cybersecurity. Network...
AI – Machine Learning – Deep Learning applied to Cybersecurity
Artificial Intelligence - AI and cybersecurity are two terms that are becoming increasingly popular in today's digital age. While AI refers to the simulation of human intelligence in machines that are capable of performing tasks such as learning, decision making, and...
The benefits of wireless connectivity
The emergence of compact wireless routers promises to optimize the deployment of distributed locations for different sorts of businesses. As a result of developments in wireless technology, two widely used concepts appeared in the telecommunications sector related to...
Should my company migrate to SD-WAN?
The world of corporate telecommunications is undergoing a technological transformation. We have gone from connecting branch office networks through expensive circuits (to ensure users have access to data center-hosted applications) to scenarios where people and...
5G Challenges in Smart Grid Electrical Distribution Networks
The world and Europe are currently experiencing a context of climate emergency, energy scarcity and electrification of energy consumption. In this environment, electricity distribution networks face a challenge of continuous improvement with a focus on more efficient...
OT cybersecurity in critical infrastructures
Now that mass and social media are booming, it is normal for marketing to take over and for technological terms to become more trivialized and popular. We are all familiar with cloud computing, now linked to edge computing, blockchain, the metaverse, AI, etc. However,...



















