What is data encryption: features and how does it work?

What is data encryption: features and how does it work? Data encryption is a fundamental security…


Medidas contra el ransomware 3.0

Ransomware 3.0: How malware evolves and what measures to take

Just a decade ago, the term "data breach" sounded like something out of a science fiction movie.…


Autonomous Artificial Intelligences

Autonomous Artificial Intelligences The transition to Autonomous Artificial Intelligence (AAI)…


Artificial Intelligence: The challenge for people's security

Artificial Intelligence: The challenge for people's security The emergence of artificial…


Third Party Risk

Third Party Risk Assessing and managing third party risk accurately and effectively for the…


NIS 2 compliance

NIS 2 compliance More than a decade ago, the European Union recognized the need to develop a common…


Extended Cybersecurity

Extended Cybersecurity The CISO faces a number of challenges that hinder his or her ability to…


Cyber Threat Intelligence

Cyber Threat Intelligence Organisations today are complex entities with extended perimeters that…


Phishing, Fraud and Scam campaigns in RRSS

Phishing, Fraud and Scam campaigns in RRSS In this document, we explore the major challenge that…