The 6 technology trends for the healthcare sector in 2024
Over the last three years, the healthcare sector has been undergoing an accelerated process of accelerated process of digitalization technology has become essential to achieve timely and quality medical care, even in situations where there are mobility restrictions. The digitalization of the healthcare sector has also been also been momentous from a business point of […]
Energy sector: Technology trends to watch out for in 2024
Introduction The energy sector and Utilities in general are in a process of total transformation, where technologies that are foreign and transversal to the sector’s own business, such as ICTs, are for the first time conditioning the medium and long-term strategies of the leading companies in energy management. And as we will be able to […]
Cookieness: Bypass Stack Canaries using Format String Vulnerabilities
In this article, the exploitation of a vulnerable binary is carried out, using a CTF (Capture The Flag) challenge designed specifically for this purpose. “Cookieness” is a challenge of the pwn category or binary exploitation that consists of reading a file called “flag.txt” through a format string vulnerability and a stack buffer overflow on a […]
Quantum cryptography and its impact on our cybersecurity
As an introduction to quantum cryptography, we begin by defining cryptography in security applied to protect information, both of users, their personal and private information, as well as that of companies and governments. To do so, we rely on ensuring confidentiality, integrity and authenticity. Confidentiality is ensured by encrypting communications from one point to another […]
DORA regulation: seeking digital operational resilience for the financial sector
On January 16, 2023, the Digital Operational Resilience Regulation, “DORA regulation“, came into force. For the first time, provisions addressing digital risk in finance are brought together in a coherent manner and in a single piece of legislation. What is the Digital Operational Resilience Regulation (DORA)? The Digital Operational Resilience Regulation solves a major […]
Cipherbit
about us Cipherbit Cipherbit Cipherbit is the first Spanish brand to combine communications encryption and cybersecurity. Cipherbit is formed by a team of 140 specialists specifically dedicated to the development of secure communications (encryption) products (hardware and software) and the development of cybersecurity services and solutions. Our solutions meet the highest security requirements of the […]
Critical infrastructure cybersecurity
To understand the importance and need from apply critical infrastructure cybersecurity, I will first define the concept as performed by the National Center for Infrastructure Protection and Cybersecurityurity (CNPIC): “They are the strategic infrastructures, which provide essential services and whose operation is indispensable and does not allow alternative solutions, so that their disruption or destruction would […]
Cybersecurity, keys to the digital transformation of companies and public administrations
Digital event on #Cybersecurity organized by the newspaper Portfolio y Uniandinos – Official to inform and guide companies and public administrations in the management and prevention of the risks involved in the acceleration of their digital transformation.
Cybersecurity and New Developments at the First National Security Scheme Meeting
Almost 10 years of the National Security Scheme and we ask ourselves, what is the state of Spanish public administrations in terms of security? On June 18, 2019, was held in the Auditorium of the Fábrica Nacional de la Moneda y Timbre the “I National Security Scheme Meeting“organized by the National Cryptologic Center (CCN), the […]
FORSETI
cybersecurity and encryption FORSETI Cybersecurity and Encryption COMPLIANCE WITH APPLICABLE REGULATIONS ON MANDATORY SECURITY AND PRIVACY REQUIREMENTS Comprehensive management to cover the adequacy and maintenance of cybersecurity regulations. FORSETI is the comprehensive solution that consolidates and improves security requirements to comply with the RGPD and the National Security Scheme. simulate cyber attack Thanks to a […]
RAGNAROK
cybersecurity and encryption RAGNAROK Ethical Hacking Cybersecurity and Encryption TO UNLEASH THE STORM, TO LEARN TO LIVE IN THE RAIN The solution that tests the security of your systems and the real strength of your business against a cyber attack. Ragnarok is the strategic solution to know the real situation of your cybersecurity systems and […]
PDSI
cybersecurity and encryption ISDP Cybersecurity and Encryption THE SECURITY PLAN, AN INDISPENSABLE ALLY OF THE ORGANIZATIONAL STRATEGY The best way to efficiently manage cybersecurity to achieve your organizational goals. The ISDP allows determining short, medium and long term cybersecurity objectives and decisions to ensure optimal security management. simulate cyber attack Your Strategy 360° Security For […]
NORNAS
cybersecurity and encryption NORNAS Cybersecurity and Encryption ENSURES BUSINESS SURVIVAL THROUGH BUSINESS CONTINUITY MANAGEMENT Comprehensive solution to ensure fast and effective response to business interruptions NORNAS is the end-to-end solution that ensures that the company continues to deliver its products or services, at an acceptable and predefined level, after a disruptive incident. simulate cyber attack […]
Industrial
cybersecurity Industrial IT and OT Network Security Cybersecurity SECURITY IN INDUSTRIAL CONTROL SYSTEMS Fundamental pillar for ensuring business continuity in industrial environments simulate cyber attack OT MONITORING SERVICE SMARTSOC IS A 24X7X365 SECURITY AND MONITORING OPERATIONS CENTER. Monitoring 24x7x365 monitoring service of your organization’s industrial assets by cyber experts. Detection Timely management of new threats, […]