Logo Teldat
Active Directory – Authentication: The key to secure, frictionless access

Active Directory – Authentication: The key to secure, frictionless access

In an increasingly identity-driven world, giving users secure, controlled, and efficient access to systems is a top priority for any organization. Authentication has come a long way from simple local passwords to complex ecosystems that combine directories, centralized policies, and identity federation. Among these approaches, Active Directory (AD) integrated authentication stands out for its...

read more
Generative AI as an attack vector: a new frontier in Cybersecurity

Generative AI as an attack vector: a new frontier in Cybersecurity

Generative Artificial Intelligence (Generative AI) is redefining the cybersecurity landscape in ways that go far beyond the purely technical. Its impact extends to the strategic level, affecting the digital and geopolitical sovereignty of companies and governments worldwide. What until recently seemed like science fiction machines capable of creating, adapting, and executing attacks autonomously...

read more
Why industrial OT security specialization is no longer optional

Why industrial OT security specialization is no longer optional

The factory floor is now a cyber battlefield. As industrial environments become increasingly connected, the traditional approach of treating Operational Technology (OT) security as an afterthoughtโ€”or worse, as an extension of IT securityโ€”is proving dangerously inadequate. Industrial OT security specialization has emerged as a critical discipline, demanding dedicated expertise, tailored...

read more
What is the CCN and how does it relate to the ENS, the CPSTIC Catalog, and cybersecurity products?

What is the CCN and how does it relate to the ENS, the CPSTIC Catalog, and cybersecurity products?

In Spain, public-sector cybersecurity is structured around several key concepts: the National Cryptology Center (CCN), the National Security Framework (ENS), the CPSTIC Catalog, and the Qualified and Approved cybersecurity products listed within it. Although closely interconnected, each plays a distinct role within Spainโ€™s public information security ecosystem. This article explains what each...

read more
Connected trains, accelerated defense: real-time Cybersecurity for embedded networks

Connected trains, accelerated defense: real-time Cybersecurity for embedded networks

In the 21st century, trains have evolved far beyond steel and track gauge. Modern rolling stock increasingly incorporates one or more IP networks that are growing ever more complex. Connected passengers, smart sensors, and critical operating systems now converge within the same environment, sharing physical cabling and radio spectrum. This digital transformation has delivered greater efficiency...

read more
Cybersecurity for Smart Grids: Protecting the energy infrastructure of the future

Cybersecurity for Smart Grids: Protecting the energy infrastructure of the future

The digital transformation of the electricity sector has accelerated the adoption of Smart Grids: advanced energy infrastructures that integrate distributed generation, active demand response systems, and real-time bidirectional communication mechanisms enabled by digital technologies. This paradigm shift represents far more than a simple technological upgrade; it marks a fundamental change in...

read more