Logo Teldat
What is the CCN and how does it relate to the ENS, the CPSTIC Catalog, and cybersecurity products?

What is the CCN and how does it relate to the ENS, the CPSTIC Catalog, and cybersecurity products?

In Spain, public-sector cybersecurity is structured around several key concepts: the National Cryptology Center (CCN), the National Security Framework (ENS), the CPSTIC Catalog, and the Qualified and Approved cybersecurity products listed within it. Although closely interconnected, each plays a distinct role within Spainโ€™s public information security ecosystem. This article explains what each...

read more
Bringing (AI) Artificial Intelligence to Internal Systems

Bringing (AI) Artificial Intelligence to Internal Systems

Inside any organization, the Information Systems department quietly powers the applications and workflows that keep everything running. These include internal tools, approval processes, service management, commercial systems, and countless business-critical interactions. Information Systems is involved in almost every corner of the company, yet much of its work remains behind the scenes. As (AI)...

read more
Why the world is now looking to Europe to lead cybersecurity?

Why the world is now looking to Europe to lead cybersecurity?

Over the past decade, cybersecurity has evolved from a specialized technical field into a core pillar of national resilience and executive responsibility. Today, boards and public administrations worldwide face a simple yet crucial question: Who can we trust to protect the systems that underpin our economies, safeguard our citizens, and uphold our institutional legitimacy? What we have seen is...

read more
Increasing Cybersecurity Risks in IoT and Edge Computing in 2025

Increasing Cybersecurity Risks in IoT and Edge Computing in 2025

In 2025, the cybersecurity risks continues to undergo a drastic transformation due to the massive consolidation of IoT and Edge Computing. Itโ€™s not just about more connected devices โ€” itโ€™s about increasingly intelligent nodes with processing and decision-making capabilities at the network edge. This technological shift expands the attack surface and introduces new vectors for sophisticated...

read more