Have you ever needed to simulate or intercept Modbus communications to debug or automate processes? In this article, we show you how to do it safely and effectively: Read the article here
Today at Inprosec Human Capital we present to you Analí Saavedra, a member of the team in charge of the finance department. What is your function within Inprosec? Since I joined Inprosec in March 2019,…
Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems. January 2021 notes Summary and highlights of the month The total number of…
After the achievement of the NEOTEC support by the InprOTech team, Inprosec’s business line. It will increase its team after the support of CDTI (Centro para el Desarrollo Tecnológico Industrial) to our project. “SANTI.IA“, acronym…
At InprOTech we are in luck, we have obtained the Neotec, a series of aids destined to new business projects of innovative companies dependent on the CDTI (Centre for the Development of Industrial Technology). This…
2020 has been a difficult year for Spanish companies due to the sudden halt in many sectors of activity as a result of the arrival of COVID-19. Hiring figures point to a 28% drop compared…
Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems. Today we bring you the update of the Q4 2020 SAP security notes.…
Despite everything that has happened this year, at Inprosec we want to be positive thinking about everything we have grown, both personally and professionally, and about everything we will continue to advance THANK YOU and…
Do you want to start your career in a sector with a future? Are you a graduate in Computer Engineering or Telecommunications Technology Engineering? At Inprosec you will have the opportunity to develop professionally in…
Industrial digital transformation has brought with it new cybersecurity challenges. OT networks, which traditionally operated in isolated environments, are now connected, making them vulnerable to complex and persistent threats. In this context, traditional monitoring tools…