Processes of Attention and Management of infrastructures and ICT services for Telefónica de Empresas customers.
5G network security
With the imminent entry into service of the 5G mobile communications standard, concern about the security of this new standard is growing every day, which is a good sign because it demonstrates the degree of awareness that society is adopting with respect to security. A few years ago, when faced with a new product, the […]
The importance of performing security audits on mobile applications
The advancement of mobile technologies, coupled with the lack of security knowledge and awareness among users, has led to an increasing number of attacks focused on exploiting vulnerabilities in mobile applications. This is why the security of these applications has taken on fundamental importance to protect user data. Conducting security audits has become an essential […]
Red Team vs Blue Team, much more than a game
Over the years, we have seen the proliferation of a multitude of devices interconnected not only to the corporate network, but also to the Internet. Sectors where it was unthinkable before, now proliferate tiny devices that make use of an Internet connection for remote monitoring and management. With the trend towards permanent connectivity and the […]
Introduction to Cyber Threat Intelligence
The digital transformation that is being experienced in companies around the world, se translates into a large number of advantages for them in relation to increased productivity, andThe company’s business is also a generalized and constant threat to the environment. in the area of information security and corporate assets. In general, organizations maintain reactive and […]
Benefits of investing in cybersecurity for businesses
It is difficult to imagine today’s business life without the use of electronic devices and their connection to the Internet. The use of Information and Communication Technologies has become a crucial issue for most business organizational systems. For companies, the use of this technology is essential: e-mail communication within the company, automation in the cloud, […]
Technical Support OSS Applications
Operations Wholesale Services Orange
Serena Telecare Platform
Pentesting and Red Team Exercise
Monitoring of security events to detect security threats, fraud cases and/or system misuse to minimize potential impacts
SPOC (Single Point of Contact) service and onsite support
Car Hacking: Is your car safe on the digital road?
We live in a world of continuous technological change and transformation. We only have to look at the evolution of mobile devices. A few years ago, it was unthinkable to have the Internet in the palm of your hand. Today, we can pay our bills with a simple watch. These technological advances have […]
PEGASUS: the spy software that worries the highest echelons of society
In the last few days new news have been appearing related to the theft of information from high political and social personalities through the use of a new spyware known as Pegasus. Originally, this software was created by the Israeli company NSO Group with the aim of facilitating governments in the investigation and […]
What is an Ethical Hacking and what is its role?
We live in times of continuous change and technological transformation. On many occasions, these advances are not accompanied by the necessary security measures, like ethical hacking, facilitating the appearance of security breaches that can be maliciously exploited. Hacker vs. cybercriminal At this point is when the figure of the hacker appears, but what is an […]