Currently, market has a wide range of systems, products and services focused on computer security services: Antivirus, Antispyware, Firewalls, IPS, WAF, SIEM systems, etc. All these measures are indispensable and have become a priority for any company or organization towards ensuring its assets, but social engineering plays with the advantage that you can use techniques that violate own vulnerabilities inherent in human beings and, as is well known, for this there is no patch or upgrade that provides effective protection against such attacks. People is normally “the weak link in the chain”. I created a presentation where I explain in details this topic, you canRead More →

Some of you maybe made some risk analysis in the past, and maybe some others use to do risk analysis in a regular basis. Some people use Octave, CRAMM, NIST or other risk analysis methodologies, but… Have you ever though if you have a GAP or a lack of visibility in the way you use to do your analysis? I created a presentation where I explain in details this topic, you can see my presentation here: Thinking on risk analysis from Ramiro CidRead More →

The use of unmanned aerial vehicles (drones) is increasing for both leisure and commercial purposes, so it is more and more an extended practice. The different uses are many and the list continue growing, thus some issues started to appear which need regulations and best practices to try to control the use in a correct way. I created a presentation where I explain the best practices about the use of drones in Critical Infrastructure, you can see my presentation here: Drones and their use on critical infrastructure from Ramiro CidRead More →

Nowadays, and even more in the future, Internet of Things, Big Data and Mobility will be present (they are already now) in our personal and professional life. The more these concepts grow, the more risk we are assuming about misuse of our Privacy Data, so more effort we will need to do to improve our privacy. Internet of Things definitely is a big relationship between physicalWorld and virtualWorld. In the future (already now) the extensive use of our data in this new “virtual World” causes a huge risk of misuse of our private data. Big Data is a broad term for data sets so large or complex thatRead More →

Until now, when people talk about cloud computing, it’s usually understood that the cloud is a metaphor for groups of remote, networked servers. Now “space computing” means it literally: physical servers operating in outer space. We can think “Cloud computing” evolution is “Cloud in the space” or simple “Space Computing”. To put servers in space have so many advantages but some clear disadvantages to solve before to put in practice. Advantages: Save energy problems, data centers use up 10% of the world’s electricity No need to freeze the servers Fast processing because the space environment A very good cost-effective to launch a server into space Disadvantages: ThereRead More →

Nowadays, and even more in the future, Internet of Things will be present (it is already now) in our personal and professional life. The more assets are “shared” (including Critical Infrastructures) in this new “environment”, the more risk we are assuming, so more effort we will need to do to improve our security. It is clear that we are “opening” many doors (too many?) to give opportunities to hackers to attack our Critical Infrastructures, environments and assets, steal or destroy our data (think about Big Data also) and maybe we can also think all it is not logical because it is an attitude with too muchRead More →