CATEGORIES

Ciberseguridad

Cumbre de administración de acceso e identidad de Gartner

We will participate in the most recent Gartner Identity & Access Management Summit . Year after year, identity is the most commonly exploited attack vector used by adversaries in cyberspace. On the enterprise side, compromised identities have been used to steal...

Ciberseguridad en el gobierno

Knowing about government cybersecurity is vitally important. Because any government’s primary security challenge is data loss related to security breaches. Protecting sensitive data from being exfiltrated and falling into the wrong hands is a government’s...

Nuevos retos a los que se enfrentan los CIOs en la actualidad

Nowadays, Chief Information Officer  are focusing on business outcomes, agility, and improving customer experience through technology. While at the same, streamlining backend operations with automation is becoming one of the primary focus areas of technology leaders....

¿Riesgo, amenaza o vulnerabilidad? ¿ Son diferentes?

Cyber threats are real—and more common than you think. The word “threat” is often confused with (or used interchangeably with) the words “risk” and “vulnerability.” But in cybersecurity, it’s important to differentiate between threat, vulnerability, and risk....
The Uber breach

The Uber breach

The Uber breach In September, ridesharing company Uber disclosed that hackers had stolen the personal information of about 57 million customers and drivers. The days following the attack were full...

leer más
Nuevos enfoques y retos en ciberseguridad

Nuevos enfoques y retos en ciberseguridad

Every company must face the new cybersecurity challenges and for this there is a new approach. "Developing a fully integrated strategic approach to cyber risk is fundamental to manufacturing value...

leer más
Ciberseguridad en el gobierno

Ciberseguridad en el gobierno

Knowing about government cybersecurity is vitally important. Because any government’s primary security challenge is data loss related to security breaches. Protecting sensitive data from being exfiltrated and falling into the wrong hands is a government’s...