AI in audits as a companion on your path to certification
Elisa Fernández
Preparing for a security audit—whether ISO/IEC 27001, ISO/IEC 22301, ENS, or NIS2—requires a significant amount of documentation and organizational work. The… Read more
Elisa Fernández
Preparing for a security audit—whether ISO/IEC 27001, ISO/IEC 22301, ENS, or NIS2—requires a significant amount of documentation and organizational work. The… Read more
Gonzalo Olver
The digitalization of public and private services in the European Union has led to significant advances in electronic identification and management… Read more
Gonzalo Olver
The Right of Access On January 20, 2025, the Spanish Data Protection Agency announced its participation in a coordinated European initiative… Read more
Gonzalo Olver
The use of biometric data, such as facial recognition, has become a common tool in various sectors, including the workplace. However,… Read more
carlostauroni
Compliance in Controversial Situations As a bullfighting fan, "they look so good behind the barrier." The truth is that putting yourself in a position... Read more
Gonzalo Álvarez Marañón
The Future of Cybersecurity In the cybersecurity space, Quantum Key Distribution (QKD) is often touted as a “100% secure alternative” … Read more
Marina Medela
Challenges and Opportunities for Businesses in the Age of Advertising and Data Protection The digital age has completely transformed the … Read more
Marina Medela
Traveler Registration and Data Protection in the Tourism Sector. Royal Decree 933/2021, of December 2, came into force last Monday, December 2. Read more
Fabian Vidal de la Fuente
The Importance of a Cybersecurity Strategy in Business In the digital age, where technology drives almost every aspect of business, … Read more
Marina Medela
Analysis of the Court's Audit Report. The entry into force of Law 2/2023, of February 20, regulating the protection of persons... Read more
Marina Medela
Blockchain technology, known for its immutability and transparency, poses a significant challenge in the context of personal data protection, especially when it comes to… Read more