Autonomous Artificial Intelligences

Autonomous Artificial Intelligences The transition to Autonomous Artificial Intelligence (AAI)…


Artificial Intelligence: The challenge for people's security

Artificial Intelligence: The challenge for people's security The emergence of artificial…


Third Party Risk

Third Party Risk Assessing and managing third party risk accurately and effectively for the…


NIS 2 compliance

Cumplimiento de la NIS 2 More than a decade ago, the European Union recognized the need to develop…


Extended Cybersecurity

Extended Cybersecurity The CISO faces a number of challenges that hinder his or her ability to…


Cyber Threat Intelligence

Cyber Threat Intelligence Organisations today are complex entities with extended perimeters that…


Phishing, Fraud and Scam campaigns in RRSS

Phishing, Fraud and Scam campaigns in RRSS In this document, we explore the major challenge that…


Top 10 Network Vulnerabilities

Top 10 Network Vulnerabilities The success of a cyberattack lies in the amount of information about…


External threat monitoring solutions

External threat monitoring solutions In an increasingly interconnected world, cybersecurity has…