Industrial cybersecurity reports and studies

At ZIUR Fundazioa we offer cybersecurity dissemination services for the industrial sector of Gipuzkoa. We collect the results of the analyzes and studies carried out in these reports that we make available to you. Download them and take firm steps to control cybersecurity in your company.

Back Report on authentication mechanisms in industrial environments

ZIUR's Technology Watch report offers companies an analysis of this security practice, compiling requirements for the practical implementation of authentication mechanisms, existing authentication methods, and the application of these methods. It also lists a series of challenges and recommendations to consider when managing access and protecting assets.

"Nearly 70% of industrial organizations have suffered cyberattacks in the last year"

ABI Research and Palo Alto Networks

The State of OT Security 2024

The IEC 624432 standard requires the authentication of human users, devices, systems, and software processes before granting them access to critical resources and systems in an industrial infrastructure. Authentication methods verify and confirm their identity through multiple factors, thereby elevating the level of security.

This ZIUR Technology Watch report offers companies an analysis of this cybersecurity practice, compiling the requirements for the practical implementation of authentication mechanisms, existing authentication methods, and the application of these methods. It also lists a series of challenges and recommendations to consider when managing access and protecting assets.

INDEX

  1. Executive summary
  2. Featured campaigns
  3. Vulnerabilities
  4. Ransomware
  5. Hacktivism
  6. Leaks
  7. Recommendations

Do you want to get in touch?

You will find a dedicated and helpful team at ZIUR. Should you be interested in finding out about our cyber security guidance service, offered through the Observatory,please contact us so that we can speak with you.