Cyber for all - Page 2

This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

Exploitation of zero-day vulnerabilities puts companies in check
Exploitation of zero-day vulnerabilities puts companies in check

Exploitation of zero-day vulnerabilities has grown in recent years and challenges companies’ cybersecurity strategies 70% of the vulnerabilities exploited in 2023 were zero-d[...]

Read more
The challenges of teleworking at the enterprise security level: how to avoid a security breach
The challenges of teleworking at the enterprise security level: how to avoid a security breach

Cybersecurity services are critical in meeting the challenges of teleworking at the enterprise security level and avoiding serious incidents Telework existed before the world was c[...]

Read more
What methodologies are commonly used in Red Team exercises?
What methodologies are commonly used in Red Team exercises?

The Red Team methodology allows cybersecurity professionals to simulate attacks against companies and contribute to improving their resilience to real incidents. In team sports suc[...]

Read more
When will the NIS2 directive be implemented in Spain?
When will the NIS2 directive be implemented in Spain?

October 17 is the deadline for the NIS2 directive to be transposed in Spain, so companies must be prepared to adapt to its provisions RGPD, DORA, NIS2… The European Union is [...]

Read more
Fake job offers. When a job opportunity turns into a nightmare
Fake job offers. When a job opportunity turns into a nightmare

Criminal groups design fake job offers to infect professionals’ devices with malware and gain access to valuable information A worker receives an email that catches his atten[...]

Read more
TLPT tests: What are they and which companies should perform them?
TLPT tests: What are they and which companies should perform them?

TLPTs are threat-based penetration tests that many financial sector entities must undergo starting in January 2025 Ever since humankind invented it, money has always attracted crim[...]

Read more
Cyberattacks can paralyze a company’s activity
Cyberattacks can paralyze a company’s activity

Security incidents can undermine business continuity and paralyze a company’s activity, generating substantial losses 87% of SMEs fear that a cyber-attack could paralyze a co[...]

Read more
MITRE ATLAS: How can AI be attacked?
MITRE ATLAS: How can AI be attacked?

MITRE ATLAS is a framework that systematizes malicious actors’ tactics and techniques to attack AI systems Both the public bodies in charge of ensuring the cybersecurity of t[...]

Read more
AI Act: Cybersecurity requirements for high-risk AI systems
AI Act: Cybersecurity requirements for high-risk AI systems

  The Artificial Intelligence Act sets out what cybersecurity requirements for high-risk AI systems must be met in the European Union Few regulations have generated more buzz [...]

Read more
Vulnerability assessment versus penetration testing. What are the differences?
Vulnerability assessment versus penetration testing. What are the differences?

Vulnerability assessment and penetration testing are compatible exercises that allow for the detection of vulnerabilities in corporate infrastructures and the prioritization of the[...]

Read more
1 2 3 4 5 14