The key to minimize cybersecurity threats and their impact is to achieve and maintain the right security level. Organizations can’t rely on their security strategy unless they conduct a regular cyber risk assessment. A cyber risk assessment is

Read More

By 2025, 80% of organizations are expected to migrate toward the cloud. Cloud initiatives predicted to make up almost 3/4 of all tech spending this year. Security with regard to the cloud is often an afterthought and the

Read More

Despite technology advances and policies in place, the human factor is still the vulnerability that cannot be defeated. There is not a magic formula or technology that can prevent a bad actor or an innocent mistake end up

Read More

Pen Testing is a simulated cyberattack that evaluates the security of a company environment. Pen testing attempts to safely compromise application systems, servers, network devices, among others. This effort validates the efficiency of defensive mechanisms, uncover vulnerabilities, and

Read More

In a world where everyone wants their data accessible and secure, cloud services are still stigmatized and seen as less reliable. There are a few myths and misconceptions surrounding the Cloud and its security. However, to date, there

Read More

This particular update contains 443 new security patches across the product families listed in this link, here in this note, we just listed few products we know are installed in some of our customers: The following release dates for updates

Read More

With the rise and popularity of Cloud services, companies have been migrating to an environment that seems more controlled, efficient, and “secure.” But, Cybercriminals are increasingly sophisticated and found the way to adequate the attacks to this new

Read More

Technologists, scholars, practitioners, agree that IoT represents a significant risk to security and privacy. Yet are company/consumer ready to give up convenience and customer experience to protect themselves? Internet of Things has spread rapidly thought the world. With

Read More

Ok, so you have an Oracle Database and you need to implement Disaster Recovery and/or High Availability strategies? First, let´s clearly understand what´s the difference between these two terms:High Availability (HA) means eliminating single points of failure and

Read More

Cross-site Scripting (XSS) and Cross-site request forgery (CSRF) are very common client-site attacks against web applications. While XSS execute scripts in the victim’s machine to gain users privileges the CSRF forge request on the victim’s behalf. It’s safe

Read More

Cognitive studies have found we are more self-motivated when we feel more in control by making our own choices. As a leader, harnessing this aspect of human nature or standing in its way can be the difference between

Read More

Being able to work from home, accessing data and services is not only convenient for companies and their employees but also create a perfect scenario for hackers and other malicious actors to take advantage, deploy, trigger, and exploit

Read More