Blog

Identifying Security Risks by Conducting Vulnerability Assessments

Thousands of security vulnerabilities are discovered every year in software, systems and IT infrastructures. Attackers exploit these vulnerabilities to penetrate the communications networks of organizations and gain access to critical assets for the purpose of harming confidentiality, integrity and availability of data or systems

Cyber-security in Healthcare

What does it come to your mind when you hear talking about hackers? Probably your first thoughts focus on breaking passwords and damaging a webpage or a computer. Maybe you think about the idea of stealing bank details in order to make money. You are right, but it is not common to relate cyber-security to healthcare when, actually, it is one of the most important targets of hackers.

Security4Safety - Enabling Digitalization for railways

Control and safety systems take a central role in the safe operation of trains in European rail networks since a long time. In the early days, around 1900, the Safety of trains was ensured by the usage of mechanical interlockings. Since then, the interlocking systems have experienced a steady evolution, which resulted in the current electronic interlockings (ESTW).

Critical Infrastructures and Cascade Effects: a study on the use of ABM to simulate the spread of viruses and the adoption of policies to prevent their spread

Critical Infrastructures and Cascade Effects: a study on the use of ABM to simulate the spread of viruses and the adoption of policies to prevent their spread

This post has been written by Vittorio Vallero and Barbara Lunel.

Most common attack vector over Critical Infrastructures

Most common attack vectors over Critical Infrastructures

This post has been written by Joaquín Rodríguez, ICT Consultant at ATOS Research and Innovation (Cybersecurity Lab).

(Madrid, Spain), Jan. 26th

In this post, we introduce most common attack vectors in critical infrastructures (CIs) in a clear and understandably way.

Pages