Autonomous Artificial Intelligences

Autonomous Artificial Intelligences

The transition to Autonomous Artificial Intelligence (AAI) marks a turning point, moving from reactive tools to proactive agents capable of reasoning and making decisions in real time. As both defenders and attackers adopt these technologies, a new paradigm of digital conflict emerges. In this text, we detail the impact of AAI, the risks involved, and the need to establish new controls.

Download Autonomous Artificial Intelligences Document

 


Artificial Intelligence: The challenge for people's security

Artificial Intelligence: The challenge for people's security

The emergence of artificial intelligence has revolutionized industries, bringing undeniable benefits. However, its development also creates new threats. Cybercriminals use AI for sophisticated attacks that violate privacy. In this document, we analyze the challenges and proactive measures that can be taken to avoid security risks.

Download Artificial Intelligence: The challenge for people's security Document


Third Party Risk

Third Party Risk

Assessing and managing third party risk accurately and effectively for the duration of the business relationship is crucial to ensure the security and continuity of any organisation’s operations. In this paper we discuss the importance of third-party cyber risk assessment, common assessment methods, their shortcomings and the benefits of introducing the XTI approach to third-party risk assessment.

Download Third Party Risk Document

 

 


NIS 2 compliance

Cumplimiento de la NIS 2

More than a decade ago, the European Union recognized the need to develop a common legal framework on cybersecurity that would lay the foundation for a shared strategy to fight cybercrime together. This need led to the creation of the NIS 1 Directive. However, as cyber threats evolved rapidly, it proved insufficient. In this document, we analyze the new NIS 2 Directive and the key aspects of the update.

Download NIS 2 compliance Document

 

 


Extended Cybersecurity

Extended Cybersecurity

The CISO faces a number of challenges that hinder his or her ability to protect the organisation. These relate to the scope of the strategy, the lack of involvement of the rest of the organisation and the insufficient corporate resources allocated to cyber security. In this paper we analyse these challenges and propose how to solve them using the corporate cyber security strategy itself based on innovative cyber security solutions.

Download Extended Cybersecurity Document

 


Cyber Threat Intelligence

Cyber Threat Intelligence

Organisations today are complex entities with extended perimeters that are difficult to delimit, which need, in addition to defence and protection strategies, intelligence strategies to manage exposure to threats. In this paper we compare perimeter cybersecurity and extended cybersecurity strategies and analyse how AI is one of the determinants of success in the new cybersecurity paradigm: cyber threat intelligence.

Download Cyber Threat Intelligence Document


Phishing, Fraud and Scam campaigns in RRSS

Phishing, Fraud and Scam campaigns in RRSS

In this document, we explore the major challenge that phishing, fraud, and scam campaigns involving corporate identity theft on social media pose for brands, the techniques used, the consequences for organizations, and advanced prevention and protection strategies against these constantly evolving cyber threats.

Deownload Phishing, Fraud and Scam campaigns in RRSS Document

 

 

 

 


Top 10 Network Vulnerabilities

Top 10 Network Vulnerabilities

The success of a cyberattack lies in the amount of information about the targeted organisation that cybercriminals have at their disposal, which makes it easier for them to prepare an attack that is very difficult to neutralise. In this document we analyse the ten most common corporate security vulnerabilities found in the network that are exploited by cybercriminals to plan their successful attack.

Download Top 10 Network Vulnerabilities Document


External threat monitoring solutions

External threat monitoring solutions

In an increasingly interconnected world, cybersecurity has become a strategic priority for organizations across all sectors. External threats, from malicious actors such as cybercriminals, industrial espionage groups, and nation-states, are constantly evolving, challenging traditional defenses and forcing companies to adopt more dynamic and proactive approaches.

Download External Threat Monitoring Solutions Document