Trends in 2019 for cybersecurity according to the show floor at the RSA Security ConferenceMar 12, 2019
Adiel Lizama 3 days agoData Broker and Privacy DataWhen surfing the Internet, everything we do generates information, from the videos we like, the songs we listen to, the pages we visit,...
Jacobo Arzaga Feb 9, 2022Survival of the fittest: breaking down EDR and XDR EDR. (2022, January 13). [Photograph]. Https://Cristianthous.Com/Que-Es-Un-Edr-Por-Que-Es-Diferente-de-Un-Antivirus....
Bernardo Buendia Jan 24, 2022Let's talk about Zero Trust Model What is Zero Trust? To talk about Zero Trust Security it is important to stop for a minute and review what the previous approach to...
Francisco CosioJan 10, 2022Spot the difference: MITRE Framework vs. Lockheed Martin Kill Chain (Cyber Kill Chain®)The Cybersecurity Kill Chain has been an intrinsic part of the cybersecurity industry for years, influencing the design of technology,...
Jacobo Arzaga Dec 17, 2021How a vulnerability stole Christmas : The tale of Log4j vulnerability Imagine a vulnerability that if exploited could have the power to wreak havoc throughout the entire internet industry, affecting many...
Alissa KnightNov 11, 2020Liars and Saints: Demystifying Cyber Deception, MITRE Shield, and Active Defense (Part 1)How MITRE Shield has turned cyber deception technology into a business imperative to deny a contested network to adversaries....
Alissa KnightOct 29, 2020All That We Let In: Hacking mHealth Apps and APIs (Part 2)Introduction Have you noticed recently that the number of API breaches seem to be rising, not ebbing? You’re not alone. As a matter of...