Category Archives: CyberSec

Cyber Security

Special Report: How to Prepare Your Organization for a Security Incident

Every organization relies on a number of certainties to keep their business running. They trust that their employees are knowledgeable, their cybersecurity strategies are robust enough to prevent vulnerabilities, and their data is protected from prying eyes, among other things. … Continue reading

Posted in CyberSec, Home, News, Risk Management | Leave a comment

Strategies for developing an Internet emergency response system

Published on Control the flow of information All events occurring in the security field i.e. vulnerabilities, compromises, crashes, different attacks, or cause-of-action takes the basis and the starting point for the information flow. A process or cycle that defines … Continue reading

Posted in CyberSec, Personal Blogs | Tagged , , , , | Leave a comment

Cybersecurity talk with Laura Gallante

Attending and listening the experience and the stories from her work towards cyber security in particular, analysis and emphasis on the concepts of information security from an American perspective and the research of the developmental or evolution of based concept … Continue reading

Posted in CyberSec | Tagged , , , , , | 1 Comment

Metadata and Privacy: Limits of Freedom online

Published on The data collection boundary (IP, Time, User, Receiver, etc.), preserving the privacy of the citizen and observing the regulations in force are the ethical principles of the democratic system that everyone has to adhere. Metadata is information … Continue reading

Posted in CyberSec, Home, Personal Blogs | Tagged , , , | Leave a comment

Internet Security and CERT Role

Published on Internet Security Day rather than a date is a moment to turn the attention to the importance of security and privacy and the role of initiatives to protect these fundamental rights that every citizen of the world … Continue reading

Image | Posted on by | Leave a comment

Malware and security risks on mobile platforms

Published on Since the 1990s, there has been a story about smart mobile phones where up to now throughout this historic period has had a great development of them.

Posted in CyberSec | Tagged , , , | Leave a comment