Cyber security in the Railways Industry

Cyber security in the Railways Industry

Cybersecurity has become a real trendy world in everybody’s live either used as a fancy term, to generate confidence associated to high technology topics, or to create panic and generate that sense of fear and urge for protection. We can find this uncomfortable…

read more
Data access security

Data access security

As time goes by, data access security is becoming a more pressing requirement in the technological world. Companies are more aware of how important it is to guarantee that those that access corporate platforms are who they say they are. Since the number of data stored is growing exponentially, the risk of identity theft poses a serious threat. Nowadays, the most common authentication system is...

read more
WPA3: Improved Wi-Fi security

WPA3: Improved Wi-Fi security

The nature of electromagnetic waves is such that anyone in a wireless network can receive the data sent over the air. With high-gain antennas, it is possible to listen in on the data that passes through an office from outside the building. That is why, right from the outset, a great deal of importance has been attached to wireless network security. By 1999, the first version of the IEEE 802.11...

read more
WPA3, the new safety standard for safer Wi-Fi networks

WPA3, the new safety standard for safer Wi-Fi networks

Nowadays, all offices, hotels, parks, hospitals and above all private domiciles, have Wi-Fi connectivity for laptops, tablets and smartphones. Likewise, we must consider the new lines of intelligent domestic equipment, also connected and remotely managed via Wi-Fi. There is, however, a question we all ask ourselves: how safe are wireless networks? Should a hacker access our Wi-Fi, they could...

read more
First SHA-1 collision

First SHA-1 collision

In February this year, a team of researchers both from Google and CWI Institute in Amsterdam announced that they were able to generate two PDFs documents with different content that would hash into the same SHA-1 digest. This may lead to a big problem in security that I will try to explain to you but first let’s put ourselves in context. What is a hash? The hash functions are one of the most...

read more
SD-WAN and security implications –Part 2

SD-WAN and security implications –Part 2

  In my last blog, I wrote about the origins of SD-WAN and its benefits. However, these advantages are certainly not without their challengers and threats, which all interested companies should consider when analyzing the various options offered by the market. From a security point of view, the main threats arising have to do with the use of unprotected residential broadband networks....

read more