NIS2
The NIS2 Directive is a fundamental regulation to strengthen cybersecurity and protect critical infrastructure in the EU.
Cybersecurity services for companies facing the challenges of digital transformation.
Digital transformation has brought great advantages for companies: increased productivity, competitiveness and market presence. However, digitalization also brings challenges in the same area, which make it necessary for companies to have a robust cybersecurity services strategy that best manages threats and risks. Cybersecurity has become indispensable within corporate processes to ensure the continuity of their […]
The 6 technology trends for the healthcare sector in 2024
Over the last three years, the healthcare sector has been undergoing an accelerated process of accelerated process of digitalization technology has become essential to achieve timely and quality medical care, even in situations where there are mobility restrictions. The digitalization of the healthcare sector has also been also been momentous from a business point of […]
Technology trends for the year 2024
2024 looks like a year full of opportunities where technologies that have been gaining prominence in recent months will occupy a larger space in the daily operations of organizations. The impact that will be experienced by those who decide to bet on these technological trends will allow them to position themselves as true leaders in their sectors.
Energy sector: Technology trends to watch out for in 2024
Introduction The energy sector and Utilities in general are in a process of total transformation, where technologies that are foreign and transversal to the sector’s own business, such as ICTs, are for the first time conditioning the medium and long-term strategies of the leading companies in energy management. And as we will be able to […]
The profile of the new technology worker
In the era of digital transformation and the rise of the knowledge economy, technology talent has become a critical resource for business success. However, the profile of the new technology worker has evolved significantly, and with it their priorities and expectations.
Cookieness: Bypass Stack Canaries using Format String Vulnerabilities
In this article, the exploitation of a vulnerable binary is carried out, using a CTF (Capture The Flag) challenge designed specifically for this purpose. “Cookieness” is a challenge of the pwn category or binary exploitation that consists of reading a file called “flag.txt” through a format string vulnerability and a stack buffer overflow on a […]
Quantum cryptography and its impact on our cybersecurity
As an introduction to quantum cryptography, we begin by defining cryptography in security applied to protect information, both of users, their personal and private information, as well as that of companies and governments. To do so, we rely on ensuring confidentiality, integrity and authenticity. Confidentiality is ensured by encrypting communications from one point to another […]
DORA regulation: seeking digital operational resilience for the financial sector
On January 16, 2023, the Digital Operational Resilience Regulation, “DORA regulation“, came into force. For the first time, provisions addressing digital risk in finance are brought together in a coherent manner and in a single piece of legislation. What is the Digital Operational Resilience Regulation (DORA)? The Digital Operational Resilience Regulation solves a major […]
Cipherbit
about us Cipherbit Cipherbit Cipherbit is the first Spanish brand to combine communications encryption and cybersecurity. Cipherbit is formed by a team of 270 specialists, specifically dedicated to the development of secure communications (encryption) products (hardware and software) and the development of cybersecurity services and solutions. Our solutions meet the highest security requirements of the […]
Critical infrastructure cybersecurity
To understand the importance and need from apply critical infrastructure cybersecurity, I will first define the concept as performed by the National Center for Infrastructure Protection and Cybersecurityurity (CNPIC): “They are the strategic infrastructures, which provide essential services and whose operation is indispensable and does not allow alternative solutions, so that their disruption or destruction would […]
Cybersecurity, keys to the digital transformation of companies and public administrations
Digital event on #Cybersecurity organized by the newspaper Portfolio y Uniandinos – Official to inform and guide companies and public administrations in the management and prevention of the risks involved in the acceleration of their digital transformation.
Cybersecurity and New Developments at the First National Security Scheme Meeting
Almost 10 years of the National Security Scheme and we ask ourselves, what is the state of Spanish public administrations in terms of security? On June 18, 2019, was held in the Auditorium of the Fábrica Nacional de la Moneda y Timbre the “I National Security Scheme Meeting“organized by the National Cryptologic Center (CCN), the […]
Decalogue for building an effective risk matrix for your company
Every organization is exposed to multiple risks on a daily basis. Knowing how to identify and manage threats is a differentiating value and a guarantee of sustainability for any company. In the following article, you will find best practices for designing and implementing an appropriate risk matrix. According to the ISO 31000 standard of the […]
FORSETI
cybersecurity and encryption FORSETI Cybersecurity and Encryption COMPLIANCE WITH APPLICABLE REGULATIONS ON MANDATORY SECURITY AND PRIVACY REQUIREMENTS Comprehensive management to cover the adequacy and maintenance of cybersecurity regulations. FORSETI is the comprehensive solution that consolidates and improves security requirements to comply with the RGPD and the National Security Scheme. simulate cyber attack Thanks to a […]