What is Threat Hunting and why has it become fashionable?

Threat Hunting has become one of the growing threat hunting systems in the business world. Given its capacity [...]

Why integrate HSTS into a security certificate?

Four years ago, Google formally implemented a security policy called HTTP Strict Transport Security (HSTS). Shortly after, highly prestigious social networks (Facebook, Twitter, Gmail ...) and [...]

The importance of cybersecurity in hospitals and medical centers

Today, the health sector is well advanced in terms of IT systems is concerned. What once took a long time because they had to perform and analyze [...]

Full cybersecurity for SMEs

We live in a world where the greatest asset that companies have is information. It is then clear that should take care, because managed through different devices [...]

Securize get industry data in 2019

Access to software, automation and ease that we provide various connectivity options make often relegate to the background related aspects [...]

Advantages of training courses cybersecurity

Cybersecurity is destined to be one of the professions most in demand by companies. In fact, today we are already seeing traces of the not so distant future. [...]

Load More Posts

Using cookies

This website uses cookies so that you have the best user experience. If you continue browsing you are giving your consent to accept the aforementioned cookies and the acceptance of our Cookies policy, click the link for more information.

ACCEPT
Cookie Notice