Blogs

By albert, In Blog, Posted 25 Jun 2020

I have accessed to a network, but what about now?

After gaining access to a business network, it is important to prioritize what is your goal or better know what…

read more
By albert, In Blog, Posted 18 Mar 2020

Teleworking safely

During these fateful days, we are all fighting against coronavirus (CoVid-19) by staying at home and extreming precautions. In that…

read more
By albert, In Blog, Posted 26 Feb 2020

The importance of software updates – Travelex

Hackers don’t care if it is your birthday, Christmas or New Years Eve.  That’s what the UK foreign currency firm…

read more
By albert, In Blog, Posted 15 Jan 2020

Travel safely, please!

Usual traveler? Do you commonly travel because of business? The bad news is that you are vulnerable! Business travelers are…

read more
By albert, In Blog, Posted 19 Sep 2019

Your iPhone is (in)secure

iPhone is considered the most unhackable smartphone, especially thanks to the fact that it is a closed OS so nobody…

read more
By albert, In Blog, Posted 3 Sep 2019

Don’t feed the Phish!

As you all should know nowadays, a phishing attack is a fraudulent attempt to obtain sensitive information such as usernames,…

read more
By albert, In Blog, Posted 1 Aug 2019

Steganography and Cyberattacks

What is steganography? It consists in concealing a message within another message. It is a combination of two Greek words:…

read more
By albert, In Blog, Posted 13 Jun 2019

The state of AI in cyber security

With so much hype over these last years in Artificial Intelligence, it makes us wonder whether AI is already prepared…

read more
By albert, In Blog, Posted 4 Jun 2019

Awareness is life

Did you know that most of cybersecurity breaches are due to human error? Social engineering is a current favourite tactic…

read more
By albert, In Blog, Posted 9 May 2019

Identity and Access Management

The identity life cycle in a company context is a term used to define the complete cycle of the identification…

read more
By albert, In Blog, Posted 7 May 2019

Forseti Security for Google Cloud Platform (GCP)

Metallica sang in “…And Justice for All”: “Hammer of justice crushes you overpower”, so who’s better to judge us than…

read more
By albert, In Blog, Posted 30 Apr 2019

"U.S. CEOs rank cyber security as their #1 external concern for 2019"

These days you can read about the economic forecast, and no one is optimistic. The commercial war unleashed by Trump…

read more
1 2 3

HOW CAN WE HELP?

Lorum ipsum dollar estar

"*" indicates required fields

El envío de este formulario es una acción positiva de que deseas estar en contacto comercial/profesional con A2SECURE. En cualquier momento podrás indicarnos que no quieres continuar. Para más información accede a nuestra política de privacidad y aviso legal.

Which PCI controls will become mandatory in March 2025?

Currently, the Payment Card Industry Data Security Standard (PCI DSS) is the most widespread and widely used set of standards…

read more

7 cybersecurity challenges that gained momentum in 2024

As the year draws to a close, it is important to analyze the main cybersecurity threats and challenges that have…

read more

Doubts and recommendations when implementing DORA/NIS2 in your company

A major wave of changes is taking place in the Information Security and business ecosystem. Specifically, there are two regulations…

read more

How can schools protect themselves from cyberattacks?

In recent times, educational centers have been a clear focus of cyber-attacks, being victims of more threats than sectors such…

read more