CATEGORIES

Ciberseguridad

Nuevos retos a los que se enfrentan los CIOs en la actualidad

Nowadays, Chief Information Officer  are focusing on business outcomes, agility, and improving customer experience through technology. While at the same, streamlining backend operations with automation is becoming one of the primary focus areas of technology leaders....

¿Riesgo, amenaza o vulnerabilidad? ¿ Son diferentes?

Cyber threats are real—and more common than you think. The word “threat” is often confused with (or used interchangeably with) the words “risk” and “vulnerability.” But in cybersecurity, it’s important to differentiate between threat, vulnerability, and risk....

Beneficios de contar con una gestión de identidades

Identity and Access Management (IAM) helps ensure that only authorized people have access. No one else, have access to the technology resources they need to do their jobs. Due to the COVID-19 pandemic, many companies have grown uncontrollably. So no longer have enough...

Wi-Fi y Seguridad de Red

The Internet enables businesses of all sizes and from any location to reach new and larger markets. In addition, it provides opportunities to work more efficiently through the use of computer-based tools. Wifi security should be part of the plan if the company uses...
Nuevos enfoques y retos en ciberseguridad

Nuevos enfoques y retos en ciberseguridad

Every company must face the new cybersecurity challenges and for this there is a new approach. "Developing a fully integrated strategic approach to cyber risk is fundamental to manufacturing value...

leer más
Resiliencia cibernética efectiva

Resiliencia cibernética efectiva

Cyber resilience refers to the ability to protect electronic data and systems from cyberattacks. As well as to quickly resume business operations in the event of a successful attack. According to...

leer más
Wi-Fi y Seguridad de Red

Wi-Fi y Seguridad de Red

The Internet enables businesses of all sizes and from any location to reach new and larger markets. In addition, it provides opportunities to work more efficiently through the use of computer-based tools. Wifi security should be part of the plan if the company uses...