Works in Cybersecurity
Cyber Attacks: What happens to people?
Carlos E. Lopez
Additionally, to what we mentioned in our previous article, it seems important not to forget about the management of people in situations of this nature, therefore, incorporating a profile for this purpose into the crisis management team generates an important contribution of value.
Advantages and disadvantages of Artificial Intelligence in Cybersecurity Risk Management
Ruben Fernandez
Cybersecurity and Artificial Intelligence Cybersecurity is one of the most relevant topics today. With the increasing dependence on technology in… Read more
Train in Cybersecurity? What awaits us in 2023?
Antonio Fernandes
Train in Cybersecurity In case you didn't know, cybersecurity trends have been a recurring topic in recent years due to the increase in… Read more
Why Cybersecurity training is necessary in 2023
Sergio Padilla
Cybersecurity in 2023 Companies, public administrations and society as a whole face a challenge that continues to increase. And this … Read more
IT Security Governance and Management
EIP
The use of appropriate methodologies contributes to improving IT security. Managing this aspect has gained importance over the years. To the … Read more
Reconciliation of data protection and cybersecurity in a company
EIP
Cybersecurity is an essential element for all companies. Without its application, you leave customer and worker data exposed to possible incidents. Yeah … Read more
SecDevOps and security in the SDLC
josuelopez
The implementation of the DevOps movement has meant an advance in software development processes and their implementation. The increasingly demanding “Time To Market” arises from the need for quality and agility in the Software Development Life Cycle to be increasingly united, and therefore the ideal solution is the automation of all phases of development. construction and testing of the code; or what is the same, Continuous Integration (CI).
The 3 most in-demand cybersecurity positions today
Izary Rondón
Being part of a RedTeam is one of the career opportunities in cybersecurity. Currently, the demand for professionals in the sector is high. … Read more
First steps in using GNU/Linux, part 4
Daniel García Baameiro
This article seeks to teach the reader how to install the GNU/Linux operating system. To do this, below, the installation alternative will be explained in a… Read more
First steps in using GNU/Linux, part 3
Daniel García Baameiro
This article seeks to teach the reader how to install the GNU/Linux operating system. To do this, below, the installation alternative will be explained in a… Read more













































