News
Between Bits and Values: The Ethical Debate Aro...
What is end-to-end encryption and why is it important? Over the last decade, information security has been gaining greater importance and awareness, where one of the aspects...
Between Bits and Values: The Ethical Debate Aro...
What is end-to-end encryption and why is it important? Over the last decade, information security has been gaining greater importance and awareness, where one of the aspects...
This is how the Research Team program of the Si...
Last Friday, November 17, the La Sexta Investigation Team program dedicated a program to cryptocurrency scams, more specifically, to Celebrity Scams, a lucrative scam...
This is how the Research Team program of the Si...
Last Friday, November 17, the La Sexta Investigation Team program dedicated a program to cryptocurrency scams, more specifically, to Celebrity Scams, a lucrative scam...
Basic cybersecurity audit of a Microsoft domain
Active Directory Directory) is a critical component in the infrastructure of many organizations, used to manage resources and users in environments Windows. The Audit of Di...
Basic cybersecurity audit of a Microsoft domain
Active Directory Directory) is a critical component in the infrastructure of many organizations, used to manage resources and users in environments Windows. The Audit of Di...
Data security as a strategic and integral axis ...
Data security, business continuity and resilience are fundamental aspects that must be considered transversal and backbones of the corporate cybersecurity strategy...
Data security as a strategic and integral axis ...
Data security, business continuity and resilience are fundamental aspects that must be considered transversal and backbones of the corporate cybersecurity strategy...
Risks associated with the impersonation of orga...
The increase in Internet use has generated consequences for people's privacy and intimacy. A large amount of personal information can be found indexed in the main search engines...
Risks associated with the impersonation of orga...
The increase in Internet use has generated consequences for people's privacy and intimacy. A large amount of personal information can be found indexed in the main search engines...
Cyber intelligence and OSINT as part of corpo...
The imperative need for an excellent level of corporate security/cybersecurity in any type of company is something that, today, is indisputable. All organizations try to i...
Cyber intelligence and OSINT as part of corpo...
The imperative need for an excellent level of corporate security/cybersecurity in any type of company is something that, today, is indisputable. All organizations try to i...