Blog
Identity and Access Management
The identity life cycle in a company context is a term used to define the complete cycle of the identification…
Forseti Security for Google Cloud Platform (GCP)
Metallica sang in “…And Justice for All”: “Hammer of justice crushes you overpower”, so who’s better to judge us than…
"U.S. CEOs rank cyber security as their #1 external concern for 2019"
These days you can read about the economic forecast, and no one is optimistic. The commercial war unleashed by Trump…
OWASP Guide: Part 3
In this post we are going to finish with the guide that we started a few days ago about OWASP….
OWASP Guide: Part 2
Today we continue with the second part of the guide on OWASP, in which we will follow the point where…
Multifactor yourself!
Have your credentials been hacked and dumped into haveibeenpwned? Do you use one of the worst 2018 passwords? Is your…
OWASP Guide: Part 1
Today, we are going to start publishing a series of posts about OWASP (Open Web Application Security Project). As a…
Explained: 51% Attacks on a Blockchain
A 51% attack on a blockchain takes place when malicious actors try to take control of more than 50% of…