Zero Trust, fortaleciendo la primera línea de defensa: Usuarios
Zero Trust, sus orígenes y cambios en el tiempo Zero Trust se originó como una filosofía o concepto centrado en un principio cardinal: nunca confiar, siempre verificar, acuñado por John Kindervag, un exvicepresidente y analista principal de Forrester, en 2010. Sin embargo, con el transcurso del tiempo, varios fabricantes han adoptado este término para definir […]
Cybersecurity: a key investment for long-term business growth.

Today, thebusiness environment isconstantly evolving towards digital, but there is one obstacle that is still holding back the growth of organizations: cybersecurity. The steadily rising cost of data breaches, with average losses of up to $4.35 million by 2022, has made cyber attacks a top concern for business owners. For this reason, more and more […]
SMEs the Cybercrime PlayGround

2022 was a challenging year for all companies, regardless of their size, economic activity and even level of cybersecurity budget. Social Engineering, Ransomware and ZeroDays attacks were mainly responsible for the headache of many IT departments and even the closure of many companies that did not have the economic muscle or the right strategy to […]
CYBERSECURITY MANAGED SERVICE, A NECESSITY IN A NEW REALITY

Cybersecurity is gaining more and more ground in the business world, what was once considered an expense is now a necessity, and should be included in your budget, regardless of whether you are a small, medium or large company. Cybercriminals no longer look at the size of the organization, anyone can be a target. Although […]
Protect your data from unwanted eyes

Applied cryptography for data protection Cryptography Cryptography is a method used to conceal important data that becomes imperceptible to the naked eye by being hidden. This may be the simplest way to describe what cryptography is. But… What is data? When we talk about data, we refer to numbers, names, surnames, facts, elements and information, […]
Risk Analysis and Assessment with ISM3 – Part 1

In mid 2019 I receive a call from the commercial manager of a company dedicated to the sale of FMCG products, the call was motivated by a security incident, they had a data breach that triggered alerts regarding their security posture. The intention of this executive was to hire the Ethical Hacking services offered by […]
Infection Monkey Open Source Attack Simulator

Have you ever wondered, do my Security Controls really work? If you are one of those who implement security controls, and you cling to the idea that your network is secure just because you have them, without really verifying them, you don’t have the budget for a penetration test and you want to avoid seeing […]