Works in Cybersecurity

pinakes financial cybersecurity platform

Cyber Attacks: What happens to people?

Carlos E. Lopez

Additionally, to what we mentioned in our previous article, it seems important not to forget about the management of people in situations of this nature, therefore, incorporating a profile for this purpose into the crisis management team generates an important contribution of value.

Artificial Intelligence 3382507 640

Advantages and disadvantages of Artificial Intelligence in Cybersecurity Risk Management

Ruben Fernandez

Cybersecurity and Artificial Intelligence Cybersecurity is one of the most relevant topics today. With the increasing dependence on technology in… Read more

Train in Cybersecurity

Train in Cybersecurity? What awaits us in 2023?

Antonio Fernandes

Train in Cybersecurity In case you didn't know, cybersecurity trends have been a recurring topic in recent years due to the increase in… Read more

Close Programmer Typing Keyboard

Why Cybersecurity training is necessary in 2023

Sergio Padilla

Cybersecurity in 2023 Companies, public administrations and society as a whole face a challenge that continues to increase. And this … Read more

Shamin Haky Uhx Ghppcdg Unsplash

IT Security Governance and Management

EIP

The use of appropriate methodologies contributes to improving IT security. Managing this aspect has gained importance over the years. To the … Read more

3780321

Reconciliation of data protection and cybersecurity in a company

EIP

Cybersecurity is an essential element for all companies. Without its application, you leave customer and worker data exposed to possible incidents. Yeah … Read more

Cybersecurity Secdevops

SecDevOps and security in the SDLC

josuelopez

The implementation of the DevOps movement has meant an advance in software development processes and their implementation. The increasingly demanding “Time To Market” arises from the need for quality and agility in the Software Development Life Cycle to be increasingly united, and therefore the ideal solution is the automation of all phases of development. construction and testing of the code; or what is the same, Continuous Integration (CI).

Risk Management

The importance of risk management when facing a project

Jaime Trinidad

In this article we will provide answers to questions such as Why do we have to do a risk analysis? o When should a risk analysis be done?

Device Protected By Cyber Security

The 3 most in-demand cybersecurity positions today

Izary Rondón

Being part of a RedTeam is one of the career opportunities in cybersecurity. Currently, the demand for professionals in the sector is high. … Read more

Study-linux

First steps in using GNU/Linux, part 4

Daniel García Baameiro

This article seeks to teach the reader how to install the GNU/Linux operating system. To do this, below, the installation alternative will be explained in a… Read more

linux-for-beginners

First steps in using GNU/Linux, part 3

Daniel García Baameiro

This article seeks to teach the reader how to install the GNU/Linux operating system. To do this, below, the installation alternative will be explained in a… Read more

Cybersecurity Google Padlock

5 tips to improve the cybersecurity of your Google account

Izary Rondón

Nowadays we use our Google account for everything. In it we store all kinds of information: from the steps we take, the calories we burn or the sites we visit, to the passwords for our accounts, addresses, bank cards, etc.