First SHA-1 collision

First SHA-1 collision

In February this year, a team of researchers both from Google and CWI Institute in Amsterdam announced that they were able to generate two PDFs documents with different content that would hash into the same SHA-1 digest. This may lead to a big problem in security that I will try to explain to you but first let’s put ourselves in context. What is a hash? The hash functions are one of the most...

read more
SD-WAN and security implications –Part 2

SD-WAN and security implications –Part 2

  In my last blog, I wrote about the origins of SD-WAN and its benefits. However, these advantages are certainly not without their challengers and threats, which all interested companies should consider when analyzing the various options offered by the market. From a security point of view, the main threats arising have to do with the use of unprotected residential broadband networks....

read more
SD-WAN and security implications – Part 1

SD-WAN and security implications – Part 1

I have written an article on SD-WAN for Seguritecnia, an online and print magazine that is very present in the private security sector in Spain. In said article, I explained the concept of SD-WAN and the security implications associated to this technology (as befits a magazine that focuses on safety). Given the enormous interest in SD-WAN, I decided to give our blog readers the opportunity of...

read more
Wireless LAN in companies, a luxury or a must-have?

Wireless LAN in companies, a luxury or a must-have?

For some companies the question arises whether it is worth having wireless LAN in the company. Others are worried that a wireless LAN network could cause security risks and even attacks on IT systems could be easier. For those who use tablet PCs in companies, wireless LAN is mandatory to provide Internet connectivity. Nevertheless, even standard notebooks become smaller and more and more...

read more
Application visualization and control needs

Application visualization and control needs

Why has visualization of applications over network become such a critical point? Firstly, the move of IT infrastructure to the cloud means our current understanding of level 3 network traffic (IP) is insufficient to characterize applications transmitting over said network: Application servers had fixed, known IP addresses in traditional data centers, whereas IP addressing in cloud is no longer...

read more
Smartgrid: Network Security

Smartgrid: Network Security

When deploying a SmartGrid network, one of the most important and demanding issues one must take into account is to ensure said network is secure, reliable and stable. The current state of the art technology allows you to activate security mechanisms in different network communication devices, so guaranteeing data confidentiality, integrity of transmitted data and availability of said...

read more