PEGASUS: the spy software that worries the highest echelons of society
In the last few days new news have been appearing related to the theft of information from high political and social personalities through the use of a new spyware known as Pegasus. Originally, this software was created by the Israeli company NSO Group with the aim of facilitating governments in the investigation and […]
Interoperability: an essential value for our healthcare system
In the present context of accelerating digital transformation in all areas of our society, the healthcare sector could not be left out. In this sense, the healthcare technology sector is the main driver to ensure the transformation of the healthcare system. However, the challenges are very great. Identifying and addressing them is our immediate task […]
In complex military systems and equipment, the best choice goes beyond price.
One of Murphy’s many laws adapted to combat states that “One should never forget that, when facing the enemy, one’s own weapon has been manufactured by the company that submitted the lowest bid.” This phrase reflects a frequent and at the same time very worrying reality, due to its possible consequences. Indeed, an administrative decision, […]
What is an Ethical Hacking and what is its role?
We live in times of continuous change and technological transformation. On many occasions, these advances are not accompanied by the necessary security measures, like ethical hacking, facilitating the appearance of security breaches that can be maliciously exploited. Hacker vs. cybercriminal At this point is when the figure of the hacker appears, but what is an […]
The transition to a new Telco sector
Impact of the merger of MásMóvil with Orange Helmets, music and blank document. I was looking forward to writing about this exciting moment in the telecommunications sector in Spain, beyond the consequences that can be glimpsed. I have a Telegram group with old and magnificent friends – the one who has been in this industry […]
Survivability of unmanned aircraft in hostile environments
The Russian invasion of Ukraine has convulsed the geopolitics of the region with a still unforeseeable impact on the rest of the world. Our environment has become much more unstable and has taken us back to times we thought were over in Europe, at least since the Balkan conflicts three decades ago. The threats arising […]
Operator challenges
A major challenge for the telecommunications sector is that it not only has to adapt to changes in an agile manner, but also and in parallel, it must continue to invest in growth areas, such as 5G, and, in turn, maintain the attraction and retention of talent, an indispensable element to be able to continue […]
Blockchain and GDPR
The blockchain, defined as a shared database that records all transactions made by users in a ledger, has been elevated to axiomatic status in recent years. This is because the blockchain bases its activity on the principle of inviolability of transactions, which, in addition to being unique, have a guaranteed traceability that certifies the transaction. […]
The Deep Web of Cyberspace: Threats in the Dark Web
Today, February 8 is International Safer Internet Day. But the Internet is like a great ocean in which, many times, we don’t know what we are going to find. In order to surf safely, we must be clear about some concepts, one of which is the “Deep Internet” or Deep Web. If you want to know what it is, this article is for you.
3 Online threats based on emotional manipulation
Although love should be the summit of trust, respect and affection, and that is what we celebrate today for Valentine’s Day; it can also cause us to suffer harm, and when this happens we feel cheated, we ask ourselves in a very critical way how we could have trusted that person and why we did not pay attention to the red flags we have observed.
Impersonated, fake and anonymous identities: 3 cyberthreats masked on the web
There is a place in the world that lives in a permanent carnival, 24 hours a day, 365 days a year: the Internet. Although it sounds good, it is important that we recognize cyberthreats masquerading online under false, impersonated or anonymous identities.
Cyberterrorism: a black swan originating in the 5th domain
Cyberterrorism is a little-known phenomenon because it is considered a Black Swan, i.e. a threat that is unlikely to materialize but which, if it does, would have catastrophic consequences for individuals and societies.
Introduction to Aerospace Cybersecurity
Outer space is virtually inert, and although its environmental conditions are unsuitable for human life, the aerospace technology that dominates its domain is essential, as noted in the National Aerospace Security Strategy (Spain, 2019): “Aerospace technology is an indispensable element in the functioning of modern societies, its assets are part of critical infrastructures, and it […]
10 tips for leading high-performance hybrid teams
In today’s work environment, brought about by the advent of remote work, connecting with the team becomes more crucial than ever. By carefully analyzing the behavior of high-performance teams, we have observed that a large part of the success lies in the management performed by the leader himself. If as a leader you want to […]
LinkedIn turns 18 and we give you 5 recommendations to use it safely
LinkedIn comes of age! Today marks 18 years since the launch of the world’s largest professional network for business, enterprise and employment use. However, like any social network, we must be aware of cyber-attacks and risk situations that we may face when using it. For this reason, we leave you with 5 key recommendations to […]