CATEGORIES

cybersecurity

Transforming risk into a strategic advantage

Transforming risk into a strategic advantage The need for a conscious, holistic approach to governance, risk, and compliance (GRC) has never been more critical to organizations. As the business environment changes, companies need to evolve their GRC strategies to...

Cybersecurity Law Code

Cybersecurity Law Code There is a European Directive, Directive 2016/1148, regarding the measures aimed at guaranteeing a high common level of security in the networks and information systems of the Union. This Directive has a couple of articles related to the...

Ransomware: To pay or not to pay

Ransomware: To pay or not to pay The main goal of hackers when carrying out a ransomware attack is to demand a ransom in return and profit. The 64% of Spanish companies agreed to pay the ransom requested by cybercriminals and 43% of them did so to become operational...

Why Zero Trust?

Zero Trust This concept was coined in 2010 by John Kindervag, a former Forrester Research analyst who is also considered one of the world's leading cybersecurity experts. Guided by the principle "never trust, always verify", the application of this strategy aims to...
Aligning security and business strategies

Aligning security and business strategies

Aligning security and business strategies In today's digital age, businesses face an ever-increasing risk of cyber-attacks. As a result, aligning security and business strategies has become critical...

read more
Transforming risk into a strategic advantage

Transforming risk into a strategic advantage

Transforming risk into a strategic advantage The need for a conscious, holistic approach to governance, risk, and compliance (GRC) has never been more critical to organizations. As the business environment changes, companies need to evolve their GRC strategies to...

Cybersecurity Law Code

Cybersecurity Law Code

Cybersecurity Law Code There is a European Directive, Directive 2016/1148, regarding the measures aimed at guaranteeing a high common level of security in the networks and information systems of the Union. This Directive has a couple of articles related to the...

Ransomware: To pay or not to pay

Ransomware: To pay or not to pay

Ransomware: To pay or not to pay The main goal of hackers when carrying out a ransomware attack is to demand a ransom in return and profit. The 64% of Spanish companies agreed to pay the ransom requested by cybercriminals and 43% of them did so to become operational...

Why Zero Trust?

Why Zero Trust?

Zero Trust This concept was coined in 2010 by John Kindervag, a former Forrester Research analyst who is also considered one of the world's leading cybersecurity experts. Guided by the principle "never trust, always verify", the application of this strategy aims to...