Cyber for all

This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

5 benefits of a security policy assessment
5 benefits of a security policy assessment

Security is one of the most important feelings for people. Since the dawn, humans have sought to feel safe from looming threats and unpredictable events. The search for security re[...]

Read more
Dear CEO: Ignoring cybersecurity will cost you dearly
Dear CEO: Ignoring cybersecurity will cost you dearly

The DORA regulation and the NIS2 directive approved by the EU raise cybersecurity requirements and increase the penalties for companies and management boards that fail to comply wi[...]

Read more
Network Security Assessment: Protecting assets, preparing for attacks
Network Security Assessment: Protecting assets, preparing for attacks

If there is anything more viral these days than ransomware, it is a TikTok challenge. In late November, the ‘Invisible Challenge’, in which people filmed themselves nak[...]

Read more
Simulation of cyber-attacks: Customize and automate your company’s security validation
Simulation of cyber-attacks: Customize and automate your company’s security validation

Cybersecurity is a strategic issue for companies and public administrations. In October, three public medical centers in Catalonia suffered a cyber-attack that paralyzed their acti[...]

Read more
Global security assessment: Knowing the weaknesses to address them
Global security assessment: Knowing the weaknesses to address them

On November 23, the European Parliament suffered a DDOS or Distributed Denial of Service attack, which caused its website to crash. A gang of Russian cybercriminals claimed respons[...]

Read more
The 5 keys to a security risk assessment
The 5 keys to a security risk assessment

Last October, the Judicial Neutral Point, a telecommunications network used to connect judicial authorities with other institutions such as the Tax Agency or the Social Security, s[...]

Read more
Essential cybersecurity services in the digital age
Essential cybersecurity services in the digital age

Over the last few years, we have become accustomed to using great concepts such as digitalization or globalization, phrases like «information is power» or «data is the new oil»[...]

Read more
NIS2: Strengthening the cybersecurity of the EU’s strategic sectors
NIS2: Strengthening the cybersecurity of the EU’s strategic sectors

The NIS2 directive aims to ensure the security of EU strategic sectors against cyber-attacks and to protect companies and citizens[...]

Read more
Cyber insurance: A complement to security audits
Cyber insurance: A complement to security audits

The digitalization of companies has had countless consequences. One of the most obvious is the fact that a large part of their critical assets is no longer physical, but digital. F[...]

Read more
DORA Regulation: Can your bank withstand a cyber-attack?
DORA Regulation: Can your bank withstand a cyber-attack?

EU-driven DORA regulation is to measure the digital operational resilience of Europe's financial sector. Complete TIBER-EU program[...]

Read more
1 2 3 4 5