Trends in 2019 for cybersecurity according to the show floor at the RSA Security ConferenceMar 12, 2019
Francisco Cosio5 days agoSMTP SmugglingWhat is SMTP Smuggling? SMTP smuggling involves exploiting vulnerabilities in mail servers to bypass security measures. Attackers...
Elisa SosaMar 8, 2022Is SOAR the tool of the future? cio_SOAR. (2020, October 30). [Illustration]. The Enterprisers Project. https://enterprisersproject.com/article/2020/10/what-is-soar-secu...
Odalys Vasquez Feb 23, 2022To Password or not to Password that is the Question. Is Paswordless Authentication the answer? PCMag. (2021, July 21). [Password login]. Got a Password Manager? Good, But You’re Using It Wrong. https://www.pcmag.com/how-to/password-...
Jacobo Arzaga Feb 9, 2022Survival of the fittest: breaking down EDR and XDR EDR. (2022, January 13). [Photograph]. Https://Cristianthous.Com/Que-Es-Un-Edr-Por-Que-Es-Diferente-de-Un-Antivirus....
Bernardo Buendia Jan 24, 2022Let's talk about Zero Trust Model What is Zero Trust? To talk about Zero Trust Security it is important to stop for a minute and review what the previous approach to...
Francisco CosioJan 10, 2022Spot the difference: MITRE Framework vs. Lockheed Martin Kill Chain (Cyber Kill Chain®)The Cybersecurity Kill Chain has been an intrinsic part of the cybersecurity industry for years, influencing the design of technology,...
Jacobo Arzaga Dec 17, 2021How a vulnerability stole Christmas : The tale of Log4j vulnerability Imagine a vulnerability that if exploited could have the power to wreak havoc throughout the entire internet industry, affecting many...