Mental models and safety for good and informed decisions
The thought process of a security professional encompasses many mental models. These do not relate exclusively to hacking or broader technology, but cover principles that have br...
Security alert fatigue and fine-tuning to combat it
Alert fatigue is a real problem in IT security. This can happen at the worst time, when analysts check their tools and see another event, or even another 50-100 events, after the...
Do you know what the main types of access attacks are?
The term access is broad and refers to the manipulation of data, access to a system or the escalation of unauthorized privileges. La recuperación de datos no autorizados es simpl...
5 cybersecurity predictions for 2023
It's the home stretch to say goodbye to 2022 and start 2023. Based on work with clients from all sectors of the industry, here is a compilation of some trends that can be predict...
What role does IPS play in threat prevention?
The goal of any cybersecurity strategy is to stop cyber threats before they have a material impact. This has resulted in many organizations seeking to be more proactive in their ...
3 questions CISOs need to ask themselves to protect your data
While the cybersecurity industry has always been marked by changing trends and the sudden debut of new technologies, the pace of change is accelerating. In the last year alone, l...
Data security and its benefits for small businesses
Cyber threats not only affect large companies and governments, they can also affect small businesses. According to research, nearly half of small businesses have suffered a cyber...
What is Network Discovery?
While we would all like to think that our networks are perfectly maintained and documented, the reality is that sometimes you lose track of them. In some cases, the network can g...