Blog

By albert, In Blog, Posted 9 May 2019

Identity and Access Management

The identity life cycle in a company context is a term used to define the complete cycle of the identification…

read more
By albert, In Blog, Posted 7 May 2019

Forseti Security for Google Cloud Platform (GCP)

Metallica sang in “…And Justice for All”: “Hammer of justice crushes you overpower”, so who’s better to judge us than…

read more
By albert, In Blog, Posted 30 Apr 2019

"U.S. CEOs rank cyber security as their #1 external concern for 2019"

These days you can read about the economic forecast, and no one is optimistic. The commercial war unleashed by Trump…

read more
By albert, In Blog, Posted 27 Mar 2019

OWASP Guide: Part 3

In this post we are going to finish with the guide that we started a few days ago about OWASP….

read more
By albert, In Blog, Posted 20 Mar 2019

OWASP Guide: Part 2

Today we continue with the second part of the guide on OWASP, in which we will follow the point where…

read more
By albert, In Blog, Posted 7 Mar 2019

Multifactor yourself!

Have your credentials been hacked and dumped into haveibeenpwned? Do you use one of the worst 2018 passwords? Is your…

read more
By albert, In Blog, Posted 28 Feb 2019

OWASP Guide: Part 1

Today, we are going to start publishing a series of posts about OWASP (Open Web Application Security Project). As a…

read more
By albert, In Blog,Blog,Uncategorized, Posted 14 Feb 2019

Explained: 51% Attacks on a Blockchain

A 51% attack on a blockchain takes place when malicious actors try to take control of more than 50% of…

read more
By albert, In Blog, Posted 13 Feb 2019

Huawei, we need to talk…

Specialized press and even mass media are currently packed with publications talking about Huawei and how the Chinese company may…

read more
By albert, In Blog, Posted 7 Feb 2019

Cyber Security Trends 2019

The RSA Conference is one of the most attractive events in the security world, not only because of the speakers,…

read more
1 2 3