The 6 technology trends for the healthcare sector in 2024

sector salud

Over the last three years, the healthcare sector has been undergoing an accelerated process of accelerated process of digitalization technology has become essential to achieve timely and quality medical care, even in situations where there are mobility restrictions. The digitalization of the healthcare sector has also been also been momentous from a business point of […]

Energy sector: Technology trends to watch out for in 2024

sector energetico

Introduction The energy sector and Utilities in general are in a process of total transformation, where technologies that are foreign and transversal to the sector’s own business, such as ICTs, are for the first time conditioning the medium and long-term strategies of the leading companies in energy management. And as we will be able to […]

Cookieness: Bypass Stack Canaries using Format String Vulnerabilities


In this article, the exploitation of a vulnerable binary is carried out, using a CTF (Capture The Flag) challenge designed specifically for this purpose. “Cookieness” is a challenge of the pwn category or binary exploitation that consists of reading a file called “flag.txt” through a format string vulnerability and a stack buffer overflow on a […]

Quantum cryptography and its impact on our cybersecurity

criptografía cuántica

As an introduction to quantum cryptography, we begin by defining cryptography in security applied to protect information, both of users, their personal and private information, as well as that of companies and governments. To do so, we rely on ensuring confidentiality, integrity and authenticity. Confidentiality is ensured by encrypting communications from one point to another […]

DORA regulation: seeking digital operational resilience for the financial sector

operativa digital

On January 16, 2023, the Digital Operational Resilience Regulation, “DORA regulation“, came into force. For the first time, provisions addressing digital risk in finance are brought together in a coherent manner and in a single piece of legislation.   What is the Digital Operational Resilience Regulation (DORA)? The Digital Operational Resilience Regulation solves a major […]


about us Cipherbit Cipherbit Cipherbit is the first Spanish brand to combine communications encryption and cybersecurity. Cipherbit is formed by a team of 140 specialists specifically dedicated to the development of secure communications (encryption) products (hardware and software) and the development of cybersecurity services and solutions. Our solutions meet the highest security requirements of the […]

Critical infrastructure cybersecurity

ciberseguridad en infraestructuras criticas

To understand the importance and need from apply critical infrastructure cybersecurity, I will first define the concept as performed by the National Center for Infrastructure Protection and Cybersecurityurity (CNPIC): “They are the strategic infrastructures, which provide essential services and whose operation is indispensable and does not allow alternative solutions, so that their disruption or destruction would […]

Cybersecurity and New Developments at the First National Security Scheme Meeting

Ciberseguridad y Novedades en el I Encuentro del Esquema Nacional de Seguridad

Almost 10 years of the National Security Scheme and we ask ourselves, what is the state of Spanish public administrations in terms of security? On June 18, 2019, was held in the Auditorium of the Fábrica Nacional de la Moneda y Timbre the “I National Security Scheme Meeting“organized by the National Cryptologic Center (CCN), the […]


FORSETI solucion ciberseguridad

cybersecurity and encryption FORSETI Cybersecurity and Encryption COMPLIANCE WITH APPLICABLE REGULATIONS ON MANDATORY SECURITY AND PRIVACY REQUIREMENTS Comprehensive management to cover the adequacy and maintenance of cybersecurity regulations. FORSETI is the comprehensive solution that consolidates and improves security requirements to comply with the RGPD and the National Security Scheme. simulate cyber attack Thanks to a […]


cybersecurity and encryption RAGNAROK Ethical Hacking Cybersecurity and Encryption TO UNLEASH THE STORM, TO LEARN TO LIVE IN THE RAIN The solution that tests the security of your systems and the real strength of your business against a cyber attack. Ragnarok is the strategic solution to know the real situation of your cybersecurity systems and […]


cybersecurity and encryption ISDP Cybersecurity and Encryption THE SECURITY PLAN, AN INDISPENSABLE ALLY OF THE ORGANIZATIONAL STRATEGY The best way to efficiently manage cybersecurity to achieve your organizational goals. The ISDP allows determining short, medium and long term cybersecurity objectives and decisions to ensure optimal security management. simulate cyber attack Your Strategy 360° Security For […]


cybersecurity and encryption NORNAS Cybersecurity and Encryption ENSURES BUSINESS SURVIVAL THROUGH BUSINESS CONTINUITY MANAGEMENT Comprehensive solution to ensure fast and effective response to business interruptions NORNAS is the end-to-end solution that ensures that the company continues to deliver its products or services, at an acceptable and predefined level, after a disruptive incident. simulate cyber attack […]


cybersecurity Industrial IT and OT Network Security Cybersecurity SECURITY IN INDUSTRIAL CONTROL SYSTEMS Fundamental pillar for ensuring business continuity in industrial environments simulate cyber attack OT MONITORING SERVICE SMARTSOC IS A 24X7X365 SECURITY AND MONITORING OPERATIONS CENTER. Monitoring 24x7x365 monitoring service of your organization’s industrial assets by cyber experts. Detection Timely management of new threats, […]


Family of SATCOM On The Move (SOTM) terminals for vehicular installation and stable mobile connection

SGoSat is a family of high-tech SOTM (Satellite Comms On The Move) terminals that are installed in a vehicle, providing the ability to target and maintain a stable connection to the satellite when the vehicle is in motion in any type of conditions.

The SGoSat family is composed of versatile terminals, which can be installed on any type of platform: trains and buses, military and/or government vehicles, aircraft, ships, etc. Originally designed for the military sector, SGoSat terminals are extremely reliable and robust, integrating high-performance components that comply with the most stringent environmental and EMI/EMC regulations. The product uses low-profile, high-efficiency antennas and a high-performance positioning and tracking unit, allowing the terminal to be operated anywhere in the world.

In order to meet the diverse needs of its customers, INSTER has developed single band and dual band terminals in X, Ka and Ku frequencies.

The SGoSat family of terminals can also be configured with a wide range of radomes (including ballistic options) to suit customer requirements.