Oh yes, blockchain technology provides a high degree of security… when it’s well-implemented, monitored, and updated. I’m speaking about the infrastructure, how you manage your wallet of cryptocurrency is open…
I said that several times, but I will say again, the Chinesse and Russian models are radically different in tactics and strategy. While Putin’s cyberdogs are foccused in low hanging…
Note for CISOs and Heads of InfoSec, a change on metrics aplying intelligence cycle approach, will be beneficial for any organisation. I have the sensation we could improve the way…
It’s preferable a cyberwar to a kinetic action? The ongoing escalation between Iran and Israel is raising the alerts in the international community, the unexpected result of a cyberattack would…
There are many ways to apply a MFA (Multi Factor Authentication), including QR codes, physical tokens, SMS and email… even over the phone, but the important part here is this:…
The use of those groups during the recent military action against Ukraine it´s more than a possibility. With the military operations in Ukraine, cyberspace represents just another playground. Are the…
Probably a good way to explain what is ransomware to your mother, this video from 2021 with John Oliver is not perfectly accurate, but one of the best you will…
Cyber Essentials is a simple cybersecurity scheme backed by the UK government, and managed by IASME, its focus is oriented to increase the security maturity in all size organisations. Even…
The domain register and web services provider Epik has suffered a serious attack. The incident involving the hacktivist group Anonymous, is affecting over 15,0003,961 emails addresses from customers and non-customers,…
The Russian Military Intelligence, GRU is conducting permanent campaigns against western interest from mid-2019 According to this cyber coallition “Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center…