How to protect from Malware that abuses DNS over HTTPS or DoH DNS over HTTPS (DoH) is a protocol to perform remote resolution of the Domain Name System (DNS) over the HTTPS...
Meet Pedro Sánchez, Top Cyber Influencer in Spain [Interview] Pedro Sánchez Cordero is a member of the Forensic Investigation 🔍 and Analysis team of the Threat Response Area of...
Meeting Ángeles Caballero, Top Cyber Influencer Spain [Interview] Ángeles Caballero works in the Cybersecurity Strategy team in the Technology & Operations (T&O) department at the Santander Group. She...
Three minimalist keys to improve security in the company There are three aspects that show how a minimalist approach can lead to a more resilient company prepared for the new security challenges of this digital age.
May You Have Exposed Sensible Information, but You Don’t Know It Yet? You want us to make it a little bit harder to the hackers? I'm sure your answer is a resounding yes, or so I hope. I invite you to read on to learn about some anecdotal cases of private and sensitive information that was there, in plain view, but we didn't "see" it until it was too late.
Company Got Hacked: 5 Steps to Fight Back Against Cyber-Attacks A cyberattack occurs when a criminal – a hacker – tries to exfiltrate information from your organization mainly for two...