Cyber for all

This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

Between €180,000 and €2 million. This will be the cost of the Cybersecurity Law for companies
Between €180,000 and €2 million. This will be the cost of the Cybersecurity Law for companies

Almost 6,000 Spanish companies will have to adapt their strategies to optimize their capacity to manage incidents and assume the cost of the Cybersecurity Law Three months behind t[...]

Read more
Testing web security: why automated tools can be insufficient
Testing web security: why automated tools can be insufficient

For many companies, every minute that a website is down is a huge financial loss. Corporate web applications are business tools, especially in the case of ecommerce, and often stor[...]

Read more
Threat Hunting & Incident Response: Two complementary and necessary services
Threat Hunting & Incident Response: Two complementary and necessary services

35 million dollars. This is the amount of losses caused by a cyber-attack on Halliburton, a multinational energy company, in August. Although the figure is shocking, the consequenc[...]

Read more
How will the Cybersecurity Coordination and Governance Act affect businesses?
How will the Cybersecurity Coordination and Governance Act affect businesses?

The draft Cybersecurity Coordination and Governance Act contemplates fines of up to 10 million euros for non-compliant companies Thousands of Spanish companies have been wondering [...]

Read more
How to report a vulnerability in software securely
How to report a vulnerability in software securely

Software vendors should enable channels to encourage vulnerabilities to be reported and mitigated before exploitation. Hundreds of vulnerabilities affecting software, devices, oper[...]

Read more
Red Team vs Blue Team: differences between two strategies to protect your business
Red Team vs Blue Team: differences between two strategies to protect your business

Since the great classical epics, humankind has been obsessed with epic conflicts: Greeks vs. Trojans, David vs. Goliath, Karpov vs. Kasparov… and Kasparov himself representin[...]

Read more
CRA Regulation: Increasing the security of the software and hardware we use
CRA Regulation: Increasing the security of the software and hardware we use

The CRA regulation imposes obligations on manufacturers, importers, and distributors to ensure secure software and hardware in the EU market Can the monitor a parent uses to monito[...]

Read more
What are the characteristics of a truly secure website?
What are the characteristics of a truly secure website?

The correct management of user permissions, the regular updating of software or the use of cryptographic protocols are some characteristics of a truly secure website. Web applicati[...]

Read more
How to report a security breach involving a personal data breach
How to report a security breach involving a personal data breach

In both the United States and Europe, it is mandatory to report a security breach in which the personal data of customers, employees or partners has been affected A few weeks ago, [...]

Read more
These are the most common security breaches in mobile applications in the Play Store and App Store
These are the most common security breaches in mobile applications in the Play Store and App Store

Trojans such as Joker, Fleckpe or Autolycos, spy codes, “benign” apps that become malicious in a second phase… Security breaches in mobile applications have been [...]

Read more
1 2 3 4 15