Cybersecurity: 13 posts to stay informed and protected from cyberthreats

December 29, 2022

With the digitization of companies and organizations and our increasing reliance on digital technologies, data and information protection must be prioritized.

The adoption of cutting-edge digital technologies is not only transforming our lives, economy, society and improving our relationship with the environment: it also means an increase in the number of malicious attacks and the sophistication of cyberattacks.

Because as Cybersecurity techniques and technologies improve, so do the tactics and methods used by cybercriminals. This forces companies to increase their resources to protect their data and systems, which are increasingly valuable and critical assets for the operations and continuity of any organization.

Data and IT and OT systems are becoming more and more valuable for companies, and are crucial to ensure their continuity and resilience.

We have selected a few posts to say goodbye to this year and welcome 2023. Contents that address the different types of attacks and threats, techniques to prevent them and the tools to detect and respond to security incidents. They also refer to the best practices that organizations should apply to protect themselves from threats. Additionally, they emphasize the need for a robust security strategy to protect them from intrusions and attacks.

Where is your company on the cybersecurity journey?
3 Key Cyber Security Considerations
Cyber Security
3 Key Cyber Security Considerations
July 3, 2023
The risks of not having controlled exposure to information (I)
Attention: Data leak! (In search of lost data)
CYBER SECURITY
Attention: Data leak! (In search of lost data)
November 3, 2022
Human factor key in cyber security
CYBER SECURITY
Human factor key in cyber security
September 28, 2022
Attacking login credentials
Cyber Security
Attacking login credentials
June 22, 2022
XDR, the cybersecurity trend that dominated the RSA Conference 2022
'Insiders' in Cybersecurity: “Catch me if you can”
Where does ransomware attack? Three main pillars
Cyber Security
Where does ransomware attack? Three main pillars
September 29, 2021
XVI STIC Conference: 5 trends in Cyber Security highlighted by our analysts for 2023
Digital Identity Wallets against identity theft fraud
Choosing a managed security services provider (MSSP): everything you need to know
Cybersecurity in OT: a need with differences
Cyber Security
Cybersecurity in OT: a need with differences
December 19, 2022