Blog
The state of AI in cyber security
With so much hype over these last years in Artificial Intelligence, it makes us wonder whether AI is already prepared…
Awareness is life
Did you know that most of cybersecurity breaches are due to human error? Social engineering is a current favourite tactic…
Identity and Access Management
The identity life cycle in a company context is a term used to define the complete cycle of the identification…
Forseti Security for Google Cloud Platform (GCP)
Metallica sang in “…And Justice for All”: “Hammer of justice crushes you overpower”, so who’s better to judge us than…
"Los CEOs en USA califican a la seguridad cibernética como su principal preocupación externa para 2019"
Estos días se puede leer sobre el pronóstico de la economía, y no hay nadie realmente optimista. La guerra comercial…
OWASP Guide: Part 3
In this post we are going to finish with the guide that we started a few days ago about OWASP….
OWASP Guide: Part 2
Today we continue with the second part of the guide on OWASP, in which we will follow the point where…
Social Engineering: How malicious people take advantage of human interaction
Social engineering is the art of manipulating and tricking people into giving up confidential data without being aware of what…