Ciberseguridad Industrial, by Logitek.
  • Getting started
  • Services
  • Partners
  • Blog
  • Contact
  • Go to Logitek
Select Page
  • English
    • Español
Design of zones and conduits according to the IEC 62443 (ISA99) standard in Industry 4.0

Design of zones and conduits according to the IEC 62443 (ISA99) standard in Industry 4.0

by Ciberseguridad Industrial by Logitek | Mar 29, 2017 | industrial cybersecurity

Logitek leveraged JNIC (Jornadas Nacionales de Ciberseguridad), an event that took place last year in Granada (Spain), to introduce the article and keynote “Design of zones and conduits according to the IEC 62443 (ISA99) standard in Industry 4.0”. This article...
OT networks segmentation and fortification: the data diode

OT networks segmentation and fortification: the data diode

by Ciberseguridad Industrial by Logitek | Apr 21, 2016 | industrial cybersecurity

The addition of devices to fortify the perimeter access and the correct network segmentation is one of the basic countermeasures to be considered within a deep defense strategy. Why is network fortification so relevant? The lack of devices than enable a secure access...
Best practices and technologies to increase security and availability in industrial control networks

Best practices and technologies to increase security and availability in industrial control networks

by Ciberseguridad Industrial by Logitek | Apr 20, 2016 | industrial cybersecurity

Industrial networks – with its convergence of PLCs, industrial protocols, SCADA systems, HMI, MES, hubs, switches, routers, firewalls, etc. – are systems on which it is necessary to: Ensure the availability, integrity and confidentiality of equipment and...
Logitek receives the 2016 ICT Security Service Award

Logitek receives the 2016 ICT Security Service Award

by Ciberseguridad Industrial by Logitek | Mar 9, 2016 | industrial cybersecurity

Logitek, Bronze sponsor in Spain of the Centro de Ciberseguridad Industrial (CCI) and member of the Red Nacional de Laboratorios Industriales (RNLI), an initiative promoted by the INCIBE, has received the 2016 ICT Security Service Award, granted by the magazine...
The ‘malicious insider’ threat in industrial operations and critical infrastructures

The ‘malicious insider’ threat in industrial operations and critical infrastructures

by Ciberseguridad Industrial by Logitek | Feb 4, 2016 | industrial cybersecurity

A ‘malicious insider’ refers to the existence of people in an organization – internal-employees or external-providers, engineering companies, integrators, contractors – who, due to careless mistakes, lack of knowledge and/or bad faith, perform an ‘action’ that affects...

Suscríbete a nuestro Newsletter

Apuntate a nuestra lista de correo y recibe las últimas noticias y novedades de nuestro equipo.

You have Successfully Subscribed!

Search

Recent Posts

  • Non-invasive intrusion and network anomalies detection systems and BlackEnergy3
  • Design of zones and conduits according to the IEC 62443 (ISA99) standard in Industry 4.0
  • OT networks segmentation and fortification: the data diode
  • Best practices and technologies to increase security and availability in industrial control networks
  • Logitek receives the 2016 ICT Security Service Award

Categories

  • industrial cybersecurity
  • Facebook
  • Twitter
  • Google
  • RSS

Designed by Ciberseguridad Industrial | Powered by Logitek - Condiciones legales - Política de privacidad

Gestionar el Consentimiento de las Cookies
We use cookies to optimize our website, collect usage statistics, identify errors, and improve our service. For more information see our
Functional Always active
El almacenamiento o acceso técnico es estrictamente necesario para el propósito legítimo de permitir el uso de un servicio específico explícitamente solicitado por el abonado o usuario, o con el único propósito de llevar a cabo la transmisión de una comunicación a través de una red de comunicaciones electrónicas.
Preferences
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
El almacenamiento o acceso técnico que es utilizado exclusivamente con fines estadísticos. El almacenamiento o acceso técnico que es utilizado exclusivamente con fines estadísticos anónimos. Sin una requerimiento, el cumplimiento voluntario por parte de su proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarlo.
Marketing
El almacenamiento o acceso técnico es necesario para crear perfiles de usuario para enviar publicidad, o para rastrear al usuario en un sitio web o en varios sitios web con fines de marketing similares.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
See preferences
{title} {title} {title}