
Cyber for all
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

Why antivirus and security suites are not enough to keep your information safe
Almost half of the SMEs does not have an incident response plan, and a third of these companies do not offer any type of cybersecurity training to their staff. In many cases, their[...]
Read more
Between €180,000 and €2 million. This will be the cost of the Cybersecurity Law for companies
Almost 6,000 Spanish companies will have to adapt their strategies to optimize their capacity to manage incidents and assume the cost of the Cybersecurity Law Three months behind t[...]
Read more
What is the difference between cloud penetration testing and regular penetration testing?
A few days ago it became public that malicious actors are exploiting a critical vulnerability in Aviatrix, a solution that allows companies to manage their cloud infrastructure thr[...]
Read more
Testing web security: why automated tools can be insufficient
For many companies, every minute that a website is down is a huge financial loss. Corporate web applications are business tools, especially in the case of ecommerce, and often stor[...]
Read more
Threat Hunting & Incident Response: Two complementary and necessary services
35 million dollars. This is the amount of losses caused by a cyber-attack on Halliburton, a multinational energy company, in August. Although the figure is shocking, the consequenc[...]
Read more
How will the Cybersecurity Coordination and Governance Act affect businesses?
The draft Cybersecurity Coordination and Governance Act contemplates fines of up to 10 million euros for non-compliant companies Thousands of Spanish companies have been wondering [...]
Read more
How to report a vulnerability in software securely
Software vendors should enable channels to encourage vulnerabilities to be reported and mitigated before exploitation. Hundreds of vulnerabilities affecting software, devices, oper[...]
Read more
Red Team vs Blue Team: differences between two strategies to protect your business
Since the great classical epics, humankind has been obsessed with epic conflicts: Greeks vs. Trojans, David vs. Goliath, Karpov vs. Kasparov… and Kasparov himself representin[...]
Read more
CRA Regulation: Increasing the security of the software and hardware we use
The CRA regulation imposes obligations on manufacturers, importers, and distributors to ensure secure software and hardware in the EU market Can the monitor a parent uses to monito[...]
Read more
What are the characteristics of a truly secure website?
The correct management of user permissions, the regular updating of software or the use of cryptographic protocols are some characteristics of a truly secure website. Web applicati[...]
Read more