Trends in 2019 for cybersecurity according to the show floor at the RSA Security ConferenceMar 12, 2019
Francisco CosioSep 26"Unmasking the Threat: A Comprehensive Investigation into Cryptocurrency Hacking"What is Cryptocurrency? I would like to begin this article by first explaining what is Cryptocurrency and why is becoming more common and...
Francisco CosioSep 26"Unmasking the Threat: A Comprehensive Investigation into Cryptocurrency Hacking"What is Cryptocurrency? I would like to begin this article by first explaining what is Cryptocurrency and why is becoming more common and...
Odalys Vasquez Sep 12GDPR Compliance– Who is protecting your data? What is GDPR? The General Data Protection Regulation, also known as GDPR, is the legislation that includes the rights of citizens in...
Elisa SosaAug 29Passkeys vs. Passwords: The downfall of passwords.What is a password? A password is a combination of letters, numbers, and symbols used to keep a secret and to confirm someone’s identity....
Jacobo Arzaga Aug 15Boosting Application Security: DAST vs. SAST vs. IAST vs. RASPIn today’s technological world, security has taken center stage and has had a significant impact on the way companies developed their...
Adiel Lizama Aug 2"Revolutionizing Communication: Exploring the Power and Potential of ChatGPT"For some time now, Chat GPT has been the constant topic of different articles and debates about technology. In addition to controversies...
Adiel Lizama Mar 15Let talk about Red Team Exercises A Red Team has the responsibility to challenge established defenses and policies, looking for vulnerabilities that can potentially be...