Blog

By albert, In Blog, Posted 19 Sep 2019

Your iPhone is (in)secure

iPhone is considered the most unhackable smartphone, especially thanks to the fact that it is a closed OS so nobody…

read more
By albert, In Blog, Posted 3 Sep 2019

Don’t feed the Phish!

As you all should know nowadays, a phishing attack is a fraudulent attempt to obtain sensitive information such as usernames,…

read more
By albert, In Blog, Posted 1 Aug 2019

Steganography and Cyberattacks

What is steganography? It consists in concealing a message within another message. It is a combination of two Greek words:…

read more
By albert, In Blog, Posted 13 Jun 2019

The state of AI in cyber security

With so much hype over these last years in Artificial Intelligence, it makes us wonder whether AI is already prepared…

read more
By albert, In Blog, Posted 4 Jun 2019

Awareness is life

Did you know that most of cybersecurity breaches are due to human error? Social engineering is a current favourite tactic…

read more
By albert, In Blog, Posted 9 May 2019

Identity and Access Management

The identity life cycle in a company context is a term used to define the complete cycle of the identification…

read more
By albert, In Blog, Posted 7 May 2019

Forseti Security for Google Cloud Platform (GCP)

Metallica sang in “…And Justice for All”: “Hammer of justice crushes you overpower”, so who’s better to judge us than…

read more
By albert, In Blog, Posted 30 Apr 2019

"U.S. CEOs rank cyber security as their #1 external concern for 2019"

These days you can read about the economic forecast, and no one is optimistic. The commercial war unleashed by Trump…

read more
By albert, In Blog, Posted 27 Mar 2019

OWASP Guide: Part 3

In this post we are going to finish with the guide that we started a few days ago about OWASP….

read more
By albert, In Blog, Posted 20 Mar 2019

OWASP Guide: Part 2

Today we continue with the second part of the guide on OWASP, in which we will follow the point where…

read more
1 2 3