Autonomous Artificial Intelligences
Autonomous Artificial Intelligences
The transition to Autonomous Artificial Intelligence (AAI) marks a turning point, moving from reactive tools to proactive agents capable of reasoning and making decisions in real time. As both defenders and attackers adopt these technologies, a new paradigm of digital conflict emerges. In this text, we detail the impact of AAI, the risks involved, and the need to establish new controls.
Download Autonomous Artificial Intelligences Document
Artificial Intelligence: The challenge for people's security
Artificial Intelligence: The challenge for people's security
The emergence of artificial intelligence has revolutionized industries, bringing undeniable benefits. However, its development also creates new threats. Cybercriminals use AI for sophisticated attacks that violate privacy. In this document, we analyze the challenges and proactive measures that can be taken to avoid security risks.
Download Artificial Intelligence: The challenge for people's security Document
Third Party Risk
Third Party Risk
Assessing and managing third party risk accurately and effectively for the duration of the business relationship is crucial to ensure the security and continuity of any organisation’s operations. In this paper we discuss the importance of third-party cyber risk assessment, common assessment methods, their shortcomings and the benefits of introducing the XTI approach to third-party risk assessment.
Download Third Party Risk Document
NIS 2 compliance
Cumplimiento de la NIS 2
More than a decade ago, the European Union recognized the need to develop a common legal framework on cybersecurity that would lay the foundation for a shared strategy to fight cybercrime together. This need led to the creation of the NIS 1 Directive. However, as cyber threats evolved rapidly, it proved insufficient. In this document, we analyze the new NIS 2 Directive and the key aspects of the update.
Download NIS 2 compliance Document
Extended Cybersecurity
Extended Cybersecurity
The CISO faces a number of challenges that hinder his or her ability to protect the organisation. These relate to the scope of the strategy, the lack of involvement of the rest of the organisation and the insufficient corporate resources allocated to cyber security. In this paper we analyse these challenges and propose how to solve them using the corporate cyber security strategy itself based on innovative cyber security solutions.
Download Extended Cybersecurity Document
Cyber Threat Intelligence
Cyber Threat Intelligence
Organisations today are complex entities with extended perimeters that are difficult to delimit, which need, in addition to defence and protection strategies, intelligence strategies to manage exposure to threats. In this paper we compare perimeter cybersecurity and extended cybersecurity strategies and analyse how AI is one of the determinants of success in the new cybersecurity paradigm: cyber threat intelligence.
Download Cyber Threat Intelligence Document
Phishing, Fraud and Scam campaigns in RRSS
Phishing, Fraud and Scam campaigns in RRSS
In this document, we explore the major challenge that phishing, fraud, and scam campaigns involving corporate identity theft on social media pose for brands, the techniques used, the consequences for organizations, and advanced prevention and protection strategies against these constantly evolving cyber threats.
Deownload Phishing, Fraud and Scam campaigns in RRSS Document
Top 10 Network Vulnerabilities
Top 10 Network Vulnerabilities
The success of a cyberattack lies in the amount of information about the targeted organisation that cybercriminals have at their disposal, which makes it easier for them to prepare an attack that is very difficult to neutralise. In this document we analyse the ten most common corporate security vulnerabilities found in the network that are exploited by cybercriminals to plan their successful attack.
Download Top 10 Network Vulnerabilities Document
External threat monitoring solutions
External threat monitoring solutions
In an increasingly interconnected world, cybersecurity has become a strategic priority for organizations across all sectors. External threats, from malicious actors such as cybercriminals, industrial espionage groups, and nation-states, are constantly evolving, challenging traditional defenses and forcing companies to adopt more dynamic and proactive approaches.
Download External Threat Monitoring Solutions Document










