Zero Trust, fortaleciendo la primera línea de defensa: Usuarios

Zero Trust, sus orígenes y cambios en el tiempo Zero Trust se originó como una filosofía o concepto centrado en un principio cardinal: nunca confiar, siempre verificar, acuñado por John Kindervag, un exvicepresidente y analista principal de Forrester, en 2010. Sin embargo, con el transcurso del tiempo, varios fabricantes han adoptado este término para definir […]

Cybersecurity: a key investment for long-term business growth.

Today, thebusiness environment isconstantly evolving towards digital, but there is one obstacle that is still holding back the growth of organizations: cybersecurity. The steadily rising cost of data breaches, with average losses of up to $4.35 million by 2022, has made cyber attacks a top concern for business owners. For this reason, more and more […]


Before going into the details of SASE, it is important to understand a little of the background of this new term. Existing network approaches and technologies simply no longer provide the levels of security and access control needed by digital organizations. These organizations demand immediate and uninterrupted access for their users, no matter where they […]

Protection with pFsense

The firewall is that piece of technology that must be part of every network. When we talk about firewalls, we immediately think of the large number of commercial solutions on the market, but we are unaware of the existence of a robust, secure and reliable platform such as PfSense.   What is pfSense? The pfSense […]

The increasingly important role of the CISO

Just as cybercriminals see an opportunity to break into systems, CISOs have the opportunity to play a larger role at the executive level. Due to the arrival of covid, cyber-attacks have increased, especially those of ransomware type, this is because companies are rushed by the pandemic to digitally transform organizations forgetting a very important factor, […]

Cloud security

In order to go into detail on the subject of cloud security, we must be clear about what cloud computing is. cloud computing. Cloud Computing is a business model based on the delivery of on-demand services, whether software, hardware or storage. In which the main objective is to acquire resources when needed. The benefits of […]

DevSecOps for a Cybersecure World

What is DevSecOps? It is the philosophy of integrating security practices within the DevOps process. The DevSecOps movement, like DevOps itself, focuses on creating new solutions for complex software development processes within an agile framework.   Key to DevSecOps Prevent the DevOps workflow from slowing down. Select the right tools to integrate security on an […]

CIS to the rescue of Cybersecurity

What is CIS? I want to start this article by introducing you to our good friends at Centro de Seguridad de Internet better known as CIS (Center of internet security). CIS is a forward-thinking nonprofit organization that harnesses the power of a global IT community to protect public and private organizations against cyber threats. CIS […]

Security in Depth the secret of Cyber Defense

Are cyber threats evolving and your controls? Today’s cyber threats are evolving and growing rapidly. Security in depth is an approach to cybersecurity in which a number of defensive mechanisms are layered on top of each other to protect valuable data and information. If one mechanism fails, another is immediately activated to stop an attack. […]

Panda Adaptive Defense 360

What is Panda Adaptive Defense 360? Panda Adaptive Defense is a cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% process classification services, and based on a single, lightweight agent. Advantages Panda Adaptive Defense 360 integrates Panda Security’s two flagship solutions into a single console: Panda Endpoint Protection Plus […]