{"id":6923,"date":"2019-11-22T12:00:00","date_gmt":"2019-11-22T12:00:00","guid":{"rendered":"https:\/\/testing.xplaye.com\/ikusi2\/the-cybersecurity-challenge\/"},"modified":"2023-08-23T17:51:03","modified_gmt":"2023-08-23T17:51:03","slug":"the-cybersecurity-challenge","status":"publish","type":"post","link":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-cybersecurity-challenge\/","title":{"rendered":"The cybersecurity challenge"},"content":{"rendered":"<p style=\"margin-bottom:10px\"><span style=\"font-size:11pt\"><span style=\"line-height:107%\"><span style=\"font-family:Calibri,sans-serif\">In some of the world\u2019s most important forums cybersecurity has become one of the biggest concerns about causes that could affect countries\u2019 economies, along with extreme weather events and natural disasters. The curious thing is that cybersecurity has achieved that visibility in a very short time.  Just eight years ago it was not among the top five concerns of world leaders.<\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom:10px\"><span style=\"font-size:11pt\"><span style=\"line-height:107%\"><span style=\"font-family:Calibri,sans-serif\">Something has changed, and this is reflected in the security budgets that CIOs are now starting to manage.<\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom:10px\"><span style=\"font-size:11pt\"><span style=\"line-height:107%\"><span style=\"font-family:Calibri,sans-serif\">Although it has already become a topical statement, it is nonetheless true. The world is changing at an exponential rate. Globalisation brings us information exchange on a worldwide scale and a progressive connectivity that is now reaching an advanced stage with the advent of Industry 4.0 and digital transformation.<\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom:10px\"><span style=\"font-size:11pt\"><span style=\"line-height:107%\"><span style=\"font-family:Calibri,sans-serif\">All of this constitutes an opportunity, but it also requires a change in the security model so that information flows and is available and businesses can benefit from the analysis of this information through big data and other technologies. In short, the use of technology can radically improve a company\u2019s performance but it also calls for a rethink of security strategies. <\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom:10px\"><span style=\"font-size:11pt\"><span style=\"line-height:107%\"><span style=\"font-family:Calibri,sans-serif\"><b>The early adopters of cybersecurity<\/b><\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom:10px\"><span style=\"font-size:11pt\"><span style=\"line-height:107%\"><span style=\"font-family:Calibri,sans-serif\">Although the need to implement cybersecurity strategies is increasingly evident for companies and institutions, regardless of their size or the sectors they operate in, some sectors are more likely than others to incorporate this type of project.  <\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom:10px\"><span style=\"font-size:11pt\"><span style=\"line-height:107%\"><span style=\"font-family:Calibri,sans-serif\">In the short to medium term, industry in particular is evolving towards a new scenario in which more and more elements are connected. Even industrial control systems are being connected to environments that were previously separate and which now must coexist as another user.<\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom:10px\"><span style=\"font-size:11pt\"><span style=\"line-height:107%\"><span style=\"font-family:Calibri,sans-serif\">This is also the case with banking. We need only look at how this sector is changing, where the office is no longer a physical space but carried in the palm of our hand, on our mobile phones. And the energy sector, with its need to provide intelligence to electrical networks. Generally, any company migrating its data to the cloud will require advanced cybersecurity solutions and services.<\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom:10px\"><span style=\"font-size:11pt\"><span style=\"line-height:107%\"><span style=\"font-family:Calibri,sans-serif\"><b>The Ikusi Intelligence platform<\/b><\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom:10px\"><span style=\"font-size:11pt\"><span style=\"line-height:107%\"><span style=\"font-family:Calibri,sans-serif\">At Ikusi, we are closely involved in this process, helping our clients to ensure the integrity of their data and to prevent incidents that threaten it, thus enabling them to benefit to the fullest from the opportunities offered by automation, connectivity and cloud services. <\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom:10px\"><span style=\"font-size:11pt\"><span style=\"line-height:107%\"><span style=\"font-family:Calibri,sans-serif\">As well as having a comprehensive portfolio of cybersecurity solutions, we have also developed a platform called Ikusi Intelligence, which covers all elements related to cybersecurity: assets, devices, processes, monitoring, inventories, trends, etc. The Ikusi Intelligence platform provides the user with a unique 360\u00ba view that allows them to visualise diagnostic, predictive and prescriptive cybersecurity analytics in order to fully optimise their security systems.<\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom:10px\"><span style=\"font-size:11pt\"><span style=\"line-height:107%\"><span style=\"font-family:Calibri,sans-serif\">Ikusi helps its clients to anticipate the security challenges posed by the new digital age. And we can do this owing to our extensive experience in critical infrastructures and in cutting-edge technologies, and we also have the qualified personnel to successfully tackle these new security challenges. Always based on our commitment to making the complicated simple.<\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom:10px\">\n<p style=\"margin-bottom:10px\">\n","protected":false},"excerpt":{"rendered":"<p>In some of the world\u2019s most important forums cybersecurity has become one of the biggest concerns about causes that could<\/p>\n","protected":false},"author":2,"featured_media":12724,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2],"tags":[],"temas":[39],"class_list":["post-6923","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","temas-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The cybersecurity challenge - Ikusi EN<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-cybersecurity-challenge\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The cybersecurity challenge - Ikusi EN\" \/>\n<meta property=\"og:description\" content=\"In some of the world\u2019s most important forums cybersecurity has become one of the biggest concerns about causes that could\" \/>\n<meta property=\"og:url\" content=\"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-cybersecurity-challenge\/\" \/>\n<meta property=\"og:site_name\" content=\"Ikusi EN\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-22T12:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-23T17:51:03+00:00\" \/>\n<meta name=\"author\" content=\"Ikusi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ikusi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-cybersecurity-challenge\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-cybersecurity-challenge\\\/\"},\"author\":{\"name\":\"Ikusi\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/#\\\/schema\\\/person\\\/bcd06b0e7689b90689815d0b78a2bc2d\"},\"headline\":\"The cybersecurity challenge\",\"datePublished\":\"2019-11-22T12:00:00+00:00\",\"dateModified\":\"2023-08-23T17:51:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-cybersecurity-challenge\\\/\"},\"wordCount\":513,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-cybersecurity-challenge\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/05\\\/cyberseguidad_0.png\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-cybersecurity-challenge\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-cybersecurity-challenge\\\/\",\"url\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-cybersecurity-challenge\\\/\",\"name\":\"The cybersecurity challenge - Ikusi EN\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-cybersecurity-challenge\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-cybersecurity-challenge\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/05\\\/cyberseguidad_0.png\",\"datePublished\":\"2019-11-22T12:00:00+00:00\",\"dateModified\":\"2023-08-23T17:51:03+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/#\\\/schema\\\/person\\\/bcd06b0e7689b90689815d0b78a2bc2d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-cybersecurity-challenge\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-cybersecurity-challenge\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-cybersecurity-challenge\\\/#primaryimage\",\"url\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/05\\\/cyberseguidad_0.png\",\"contentUrl\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/05\\\/cyberseguidad_0.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-cybersecurity-challenge\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The cybersecurity challenge\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/\",\"name\":\"Ikusi EN\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/#\\\/schema\\\/person\\\/bcd06b0e7689b90689815d0b78a2bc2d\",\"name\":\"Ikusi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/962736704ad33e8f2d1fd7afc591ab0f78027bd65a33c2312c6d1ef90a4b2e77?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/962736704ad33e8f2d1fd7afc591ab0f78027bd65a33c2312c6d1ef90a4b2e77?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/962736704ad33e8f2d1fd7afc591ab0f78027bd65a33c2312c6d1ef90a4b2e77?s=96&d=mm&r=g\",\"caption\":\"Ikusi\"},\"url\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/author\\\/ikusi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The cybersecurity challenge - Ikusi EN","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-cybersecurity-challenge\/","og_locale":"en_US","og_type":"article","og_title":"The cybersecurity challenge - Ikusi EN","og_description":"In some of the world\u2019s most important forums cybersecurity has become one of the biggest concerns about causes that could","og_url":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-cybersecurity-challenge\/","og_site_name":"Ikusi EN","article_published_time":"2019-11-22T12:00:00+00:00","article_modified_time":"2023-08-23T17:51:03+00:00","author":"Ikusi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ikusi","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-cybersecurity-challenge\/#article","isPartOf":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-cybersecurity-challenge\/"},"author":{"name":"Ikusi","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/#\/schema\/person\/bcd06b0e7689b90689815d0b78a2bc2d"},"headline":"The cybersecurity challenge","datePublished":"2019-11-22T12:00:00+00:00","dateModified":"2023-08-23T17:51:03+00:00","mainEntityOfPage":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-cybersecurity-challenge\/"},"wordCount":513,"commentCount":0,"image":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-cybersecurity-challenge\/#primaryimage"},"thumbnailUrl":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-content\/uploads\/sites\/2\/2023\/05\/cyberseguidad_0.png","articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-cybersecurity-challenge\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-cybersecurity-challenge\/","url":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-cybersecurity-challenge\/","name":"The cybersecurity challenge - Ikusi EN","isPartOf":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-cybersecurity-challenge\/#primaryimage"},"image":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-cybersecurity-challenge\/#primaryimage"},"thumbnailUrl":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-content\/uploads\/sites\/2\/2023\/05\/cyberseguidad_0.png","datePublished":"2019-11-22T12:00:00+00:00","dateModified":"2023-08-23T17:51:03+00:00","author":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/#\/schema\/person\/bcd06b0e7689b90689815d0b78a2bc2d"},"breadcrumb":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-cybersecurity-challenge\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-cybersecurity-challenge\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-cybersecurity-challenge\/#primaryimage","url":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-content\/uploads\/sites\/2\/2023\/05\/cyberseguidad_0.png","contentUrl":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-content\/uploads\/sites\/2\/2023\/05\/cyberseguidad_0.png"},{"@type":"BreadcrumbList","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-cybersecurity-challenge\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/testing.xplaye.com\/ikusi2\/en\/"},{"@type":"ListItem","position":2,"name":"The cybersecurity challenge"}]},{"@type":"WebSite","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/#website","url":"https:\/\/testing.xplaye.com\/ikusi2\/en\/","name":"Ikusi EN","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/testing.xplaye.com\/ikusi2\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/#\/schema\/person\/bcd06b0e7689b90689815d0b78a2bc2d","name":"Ikusi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/962736704ad33e8f2d1fd7afc591ab0f78027bd65a33c2312c6d1ef90a4b2e77?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/962736704ad33e8f2d1fd7afc591ab0f78027bd65a33c2312c6d1ef90a4b2e77?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/962736704ad33e8f2d1fd7afc591ab0f78027bd65a33c2312c6d1ef90a4b2e77?s=96&d=mm&r=g","caption":"Ikusi"},"url":"https:\/\/testing.xplaye.com\/ikusi2\/en\/author\/ikusi\/"}]}},"_links":{"self":[{"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/posts\/6923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/comments?post=6923"}],"version-history":[{"count":1,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/posts\/6923\/revisions"}],"predecessor-version":[{"id":10296,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/posts\/6923\/revisions\/10296"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/media?parent=6923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/categories?post=6923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/tags?post=6923"},{"taxonomy":"temas","embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/temas?post=6923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}