Cyber-Attacks Set To Become "Uninsurable" This is the stark assessment from...
CATEGORIES
cybersecurity
Transforming risk into a strategic advantage
Transforming risk into a strategic advantage The need for a conscious,...
Cybersecurity Law Code
Cybersecurity Law Code There is a European Directive, Directive 2016/1148,...
Ransomware: To pay or not to pay
Ransomware: To pay or not to pay The main goal of hackers when carrying out a ransomware attack is to demand a ransom in return and profit. The 64% of Spanish companies agreed to pay the ransom...
Why Zero Trust?
Zero Trust This concept was coined in 2010 by John Kindervag, a former Forrester Research analyst who is also considered one of the world's leading cybersecurity experts. Guided by the principle...
Cybersecurity Trends in 2023
Cybersecurity Trends in 2023 According to a report recently published by the insurer Hiscox, cyberattacks in Spain have an average cost per company of 105.000 euros, almost double compared to 2020,...
Key Benefits of Identity and Access Management
Identity and Access Management (IAM) helps ensure that only authorized people have access. No one else, have access to the technology resources they need to do their jobs. Due to the COVID-19 pandemic, many companies have grown uncontrollably. So no longer have enough...
Cyber threats , risk or vulnerability? What are the differences?
Cyber threats are real—and more common than you think. The word “threat” is often confused with (or used interchangeably with) the words “risk” and “vulnerability.” But in cybersecurity, it’s important to differentiate between threat, vulnerability, and risk....
New Challenges faced by Chief Information Officer today
Nowadays, Chief Information Officer are focusing on business outcomes, agility, and improving customer experience through technology. While at the same, streamlining backend operations with automation is becoming one of the primary focus areas of technology leaders....
Cybersecurity at Healthcare companies
Digital technologies make it easier and more efficient to deliver patient care and provide better outcomes. However, the rise of digital technologies and the growing interconnectedness between different healthcare systems come with increasing healthcare cybersecurity...