{"id":125301,"date":"2021-02-09T12:39:24","date_gmt":"2021-02-09T11:39:24","guid":{"rendered":"https:\/\/eurecat.org\/desenvolupen-solucions-ciberseguretat-proteccio-infraestructures-critiques\/"},"modified":"2022-07-25T17:34:15","modified_gmt":"2022-07-25T16:34:15","slug":"cybersecurity-solutions-for-critical-infrastructure-protection-under-development","status":"publish","type":"post","link":"https:\/\/eurecat.org\/en\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\/","title":{"rendered":"Cybersecurity solutions for critical infrastructure protection under development"},"content":{"rendered":"<p>The\u00a0<a href=\"http:\/\/eurecat.org\/\"><strong>Eurecat<\/strong><\/a>\u00a0technology centre is leading the\u00a0<strong>Secutil<\/strong> project which has addressed technological innovations to safeguard the\u00a0<strong>cybersecurity<\/strong>\u00a0and\u00a0<strong>physical security of critical water, gas and electricity infrastructures<\/strong>. It is built on the deployment of internet-connected devices (IoT) in order to step up the resilience of this type of infrastructure against potential cybernetic or combined (physical and cyber) attacks.<\/p>\n<p>The Secutil project, which comes to an end in March, is part of the <strong>Ris3Cat Utilities Community<\/strong> and involves Cellnex, Naturgy, Cetaqua, the Polytechnic University of Catalonia (UPC), the University of Lleida (UdL) and the Barcelona Supercomputing Center (BSC).<\/p>\n<p>\u201cThe project holistically addresses the resilience of critical infrastructures,\u201d says Mario Reyes, head of research at Eurecat\u2019s IT&amp;OT Security Unit. It includes algorithms, technologies and systems based on cryptography, artificial intelligence, machine learning and cognitive reasoning in anticipation of \u201ca huge increase in sensorisation, in the volume of data and in the type of critical data.\u201d<\/p>\n<p>\u201cThe goal is to build distributed, decentralised and smart tools and solutions to address new security challenges while also generating knowledge about attacks, threats and attackers and improving decision-making,\u201d he adds.<\/p>\n<p>\u201cThis will ramp up the resilience of critical infrastructures,\u201d notes Juan Caubet, director of IT&amp;OT Security at Eurecat. \u201cMoreover, sharing the knowledge of threats and attacks acquired will also help in the global battle against cybercrime and cyberterrorism.\u201d<\/p>\n<p>With this in mind, the Secutil project has encompassed innovations in cryptographic key management and authentication systems, hardwiring quantum computing-resistant cryptography into IoT devices, data integrity and secure and efficient firmware updates.<\/p>\n<p>It has also addressed physical access control systems combined with privacy-preserving authentication, positioning and human detection systems, new bio-inspired attack protection, prediction and detection models and active and autonomous defence mechanisms driven by the attack and threat intelligence generated.<\/p>\n<p>The Secutil project, which will conclude next March, has been running for three years with a total budget coming to \u20ac1,253,787. It has been co-financed by the European Union through the European Regional Development Fund (ERDF) managed by Catalonia Trade &amp; Investment, the Catalan Government\u2019s business competitiveness agency, with a \u20ac626,893 envelope.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The\u00a0Eurecat\u00a0technology centre is leading the\u00a0Secutil project which has addressed technological innovations to safeguard the\u00a0cybersecurity\u00a0and\u00a0physical security of critical water, gas and electricity infrastructures. It is built on the deployment of internet-connected devices (IoT) in order to step up the resilience of this type of infrastructure against potential cybernetic or combined (physical and cyber) attacks. The Secutil  [&#8230;]<\/p>\n","protected":false},"author":27,"featured_media":110440,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[424,743],"tags":[],"class_list":["post-125301","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security-en","category-press-notes-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Solucions de ciberseguretat per a la protecci\u00f3 d&#039;infraestructures critiques<\/title>\n<meta name=\"description\" content=\"Cybersecurity solutions for critical infrastructure protection under development\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eurecat.org\/en\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Solucions de ciberseguretat per a la protecci\u00f3 d&#039;infraestructures critiques\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity solutions for critical infrastructure protection under development\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eurecat.org\/en\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\/\" \/>\n<meta property=\"og:site_name\" content=\"Eurecat\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-09T11:39:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-25T16:34:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eurecat.org\/wp-content\/uploads\/2021\/02\/Eurecat-Secutil_930x515px.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"930\" \/>\n\t<meta property=\"og:image:height\" content=\"515\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"eurecatNG\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"eurecatNG\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\\\/\"},\"author\":{\"name\":\"eurecatNG\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/#\\\/schema\\\/person\\\/8342992d6929ad043b305d3cac68b3f4\"},\"headline\":\"Cybersecurity solutions for critical infrastructure protection under development\",\"datePublished\":\"2021-02-09T11:39:24+00:00\",\"dateModified\":\"2022-07-25T16:34:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\\\/\"},\"wordCount\":359,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eurecat.org\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Eurecat-Secutil_930x515px.jpg\",\"articleSection\":[\"IT-Security\",\"Press Notes\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/eurecat.org\\\/en\\\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\\\/\",\"url\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\\\/\",\"name\":\"Solucions de ciberseguretat per a la protecci\u00f3 d'infraestructures critiques\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eurecat.org\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Eurecat-Secutil_930x515px.jpg\",\"datePublished\":\"2021-02-09T11:39:24+00:00\",\"dateModified\":\"2022-07-25T16:34:15+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/#\\\/schema\\\/person\\\/8342992d6929ad043b305d3cac68b3f4\"},\"description\":\"Cybersecurity solutions for critical infrastructure protection under development\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eurecat.org\\\/en\\\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eurecat.org\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Eurecat-Secutil_930x515px.jpg\",\"contentUrl\":\"https:\\\/\\\/eurecat.org\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Eurecat-Secutil_930x515px.jpg\",\"width\":930,\"height\":515,\"caption\":\"eurecat secutil\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inici\",\"item\":\"https:\\\/\\\/eurecat.org\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity solutions for critical infrastructure protection under development\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/eurecat.org\\\/en\\\/\",\"name\":\"Eurecat\",\"description\":\"Otro sitio realizado con WordPress\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eurecat.org\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/#\\\/schema\\\/person\\\/8342992d6929ad043b305d3cac68b3f4\",\"name\":\"eurecatNG\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/63200cb70ae4f15a0f673050f36df149dba802bea7614e8f838aaccfcf8ea11d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/63200cb70ae4f15a0f673050f36df149dba802bea7614e8f838aaccfcf8ea11d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/63200cb70ae4f15a0f673050f36df149dba802bea7614e8f838aaccfcf8ea11d?s=96&d=mm&r=g\",\"caption\":\"eurecatNG\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Solucions de ciberseguretat per a la protecci\u00f3 d'infraestructures critiques","description":"Cybersecurity solutions for critical infrastructure protection under development","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eurecat.org\/en\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\/","og_locale":"en_US","og_type":"article","og_title":"Solucions de ciberseguretat per a la protecci\u00f3 d'infraestructures critiques","og_description":"Cybersecurity solutions for critical infrastructure protection under development","og_url":"https:\/\/eurecat.org\/en\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\/","og_site_name":"Eurecat","article_published_time":"2021-02-09T11:39:24+00:00","article_modified_time":"2022-07-25T16:34:15+00:00","og_image":[{"width":930,"height":515,"url":"https:\/\/eurecat.org\/wp-content\/uploads\/2021\/02\/Eurecat-Secutil_930x515px.jpg","type":"image\/jpeg"}],"author":"eurecatNG","twitter_card":"summary_large_image","twitter_misc":{"Written by":"eurecatNG","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eurecat.org\/en\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\/#article","isPartOf":{"@id":"https:\/\/eurecat.org\/en\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\/"},"author":{"name":"eurecatNG","@id":"https:\/\/eurecat.org\/en\/#\/schema\/person\/8342992d6929ad043b305d3cac68b3f4"},"headline":"Cybersecurity solutions for critical infrastructure protection under development","datePublished":"2021-02-09T11:39:24+00:00","dateModified":"2022-07-25T16:34:15+00:00","mainEntityOfPage":{"@id":"https:\/\/eurecat.org\/en\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\/"},"wordCount":359,"commentCount":0,"image":{"@id":"https:\/\/eurecat.org\/en\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\/#primaryimage"},"thumbnailUrl":"https:\/\/eurecat.org\/wp-content\/uploads\/2021\/02\/Eurecat-Secutil_930x515px.jpg","articleSection":["IT-Security","Press Notes"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/eurecat.org\/en\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/eurecat.org\/en\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\/","url":"https:\/\/eurecat.org\/en\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\/","name":"Solucions de ciberseguretat per a la protecci\u00f3 d'infraestructures critiques","isPartOf":{"@id":"https:\/\/eurecat.org\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eurecat.org\/en\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\/#primaryimage"},"image":{"@id":"https:\/\/eurecat.org\/en\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\/#primaryimage"},"thumbnailUrl":"https:\/\/eurecat.org\/wp-content\/uploads\/2021\/02\/Eurecat-Secutil_930x515px.jpg","datePublished":"2021-02-09T11:39:24+00:00","dateModified":"2022-07-25T16:34:15+00:00","author":{"@id":"https:\/\/eurecat.org\/en\/#\/schema\/person\/8342992d6929ad043b305d3cac68b3f4"},"description":"Cybersecurity solutions for critical infrastructure protection under development","breadcrumb":{"@id":"https:\/\/eurecat.org\/en\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eurecat.org\/en\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eurecat.org\/en\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\/#primaryimage","url":"https:\/\/eurecat.org\/wp-content\/uploads\/2021\/02\/Eurecat-Secutil_930x515px.jpg","contentUrl":"https:\/\/eurecat.org\/wp-content\/uploads\/2021\/02\/Eurecat-Secutil_930x515px.jpg","width":930,"height":515,"caption":"eurecat secutil"},{"@type":"BreadcrumbList","@id":"https:\/\/eurecat.org\/en\/cybersecurity-solutions-for-critical-infrastructure-protection-under-development\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inici","item":"https:\/\/eurecat.org\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity solutions for critical infrastructure protection under development"}]},{"@type":"WebSite","@id":"https:\/\/eurecat.org\/en\/#website","url":"https:\/\/eurecat.org\/en\/","name":"Eurecat","description":"Otro sitio realizado con WordPress","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eurecat.org\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/eurecat.org\/en\/#\/schema\/person\/8342992d6929ad043b305d3cac68b3f4","name":"eurecatNG","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/63200cb70ae4f15a0f673050f36df149dba802bea7614e8f838aaccfcf8ea11d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/63200cb70ae4f15a0f673050f36df149dba802bea7614e8f838aaccfcf8ea11d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/63200cb70ae4f15a0f673050f36df149dba802bea7614e8f838aaccfcf8ea11d?s=96&d=mm&r=g","caption":"eurecatNG"}}]}},"_links":{"self":[{"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/posts\/125301","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/comments?post=125301"}],"version-history":[{"count":1,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/posts\/125301\/revisions"}],"predecessor-version":[{"id":125302,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/posts\/125301\/revisions\/125302"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/media\/110440"}],"wp:attachment":[{"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/media?parent=125301"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/categories?post=125301"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/tags?post=125301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}