Free Internet Bar for your Children?

Let’s talk about screens. In particular, the use of screens by minors. This is certainly a subject of much debate. I imagine that, if you have children, you will have noticed this. Because one thing is undeniable: screens are part of their lives. Even if you don’t like it, that’s the way it is. And … Read more

Two not only technological trends in Edge Computing

Although the edge computing market is a significant volume market, it is still a nascent market. No de facto standards have been imposed on the technologies to be used and there are many market sectors using edge computing, which makes it even more difficult to understand which are the key technologies for adoption.
Projections for the coming years are very optimistic and a CAGR (Compound Annual Growth Rate) of 19% is expected, which should mean that the market volume will be USD 87.3 billion in 2026.

IIoT security: best practices

I have been talking about IIoT security for days. The truth is that I am passionate about this subject. But it is also true that the subject is so vast that there is plenty of content to go around.
In today’s video, I focus on good practices, and on things you can do to improve safety in your factory.

IoT: security at the network level

Do you know what a botnet is? Does the name Mirai ring a bell?
I’ll tell you about it.
A botnet is a network of zombie devices that have been infected by malware, devices that are ready to be used for some illicit activity.
Mirai was a botnet that infected IoT devices. It brought hundreds of thousands of IoT devices under its control, which was used to launch an attack against a US college. Leaving it without service for 54 hours. It is one of the most important attacks in the history of the Internet.

IoT: device-level security

It is highly likely that you have at some point purchased a home monitoring device connected to the Internet, such as an IP camera. And I’m also pretty sure you didn’t change the default password.
Such small devices are still computers that have been manufactured a long time ago and have been waiting on the shelf for months to be sold. At best, they are products that offer upgrades, but this is not the norm.

Security responsibilities in Cloud Computing

The vast majority of data from IIoT solutions end up in the cloud. And in the cloud, there are a variety of important services, each with its own specifications.
Today I am going to talk to you about the degree of responsibility for each of these services, to see what depends on you and what depends on the contracted provider.
In the graph I have summarised it by colour: in orange everything that depends on you, the customer. In grey, everything depends on the supplier.
To start with, we see the typical cloud services at the top of the image: IaaS (infrastructure as a service), PaaS (platform as a service), and SaaS (software as a service). We also see that from left to right, we have less and less responsibility for service.

Weaknesses in IIoT

Controlling the entire IIoT architecture is no easy task. But it is by no means impossible. And we would agree that it is vital to keep it under control.
It should be borne in mind that there are many security threats. In fact, there are so many types of architectures that talking about threats, in general, is complicated.

Cybersecurity incidents in ICS

Did you know that 8 out of 10 cybersecurity incidents in ICS (industrial control systems) are unintentional?
Contrary to what most people think, very few cyber security incidents are caused by hackers.
In fact, hackers cause only 10%, and together with another 10% caused by disgruntled employees, they represent intentional incidents.
And what are the 80% of unintentional incidents?

¡Suscríbete a mi newsletter!

Marketing permission: I give my consent to to be in touch with me via email using the information I have provided in this form for the purpose of news, updates and marketing. What to expect: If you wish to withdraw your consent and stop hearing from us, simply click the unsubscribe link at the bottom of every email we send or contact us at We value and respect your personal data and privacy. To view our privacy policy, please visit our website. By submitting this form, you agree that we may process your information in accordance with these terms.