Articles by: Ackcent Cybersecurity

Ackcent becomes INDESIA’s cybersecurity partner for protecting its industrial AI platform

Ackcent becomes INDESIA’s cybersecurity partner for protecting its industrial AI platform

We are pleased to announce that Ackcent has been selected as INDESIA’s cybersecurity technology partner. INDESIA is the industrial alliance…

Lluís Vera, CEO of Ackcent, Highlights the Urgency of Cybersecurity in the Ports Sector Amid Growing Cyberattack Risks

Lluís Vera, CEO of Ackcent, Highlights the Urgency of Cybersecurity in the Ports Sector Amid Growing Cyberattack Risks

Cybersecurity has become a critical priority for protecting essential infrastructure, especially in sectors like the ports industry, where digital threats…

Ackcent Cybersecurity debuts in the MSSP Alert TOP 250

Ackcent Cybersecurity debuts in the MSSP Alert TOP 250

Ackcent Secures Position #144 in the Global MSSP Ranking

Ackcent leads the cybersecurity session at Smart City Expo 2024

Ackcent leads the cybersecurity session at Smart City Expo 2024

Lluís Vera, CEO of Ackcent, sharing the stage at Smart City Expo 2024 with prominent industry leaders such as Tony Zhong, Director of Information Security at the Port of Los Angeles, and Cristian Medrano, CISO of the Port of Barcelona.

Two Critical Vulnerabilities Discovered in JetBrains TeamCity

Two Critical Vulnerabilities Discovered in JetBrains TeamCity

Rapid7 researchers have discovered two critical vulnerabilities in JetBrains TeamCity – a popular build management and continuous integration/delivery (CI/CD) server.…

Managing Vulnerabilities in the Digital Era

Managing Vulnerabilities in the Digital Era

The modern digital environment is constantly evolving. Today, security leaders of organizations of all sizes in all sectors are tasked…

The Definitive Guide to Managing Cybersecurity Incidents

The Definitive Guide to Managing Cybersecurity Incidents

The success of a modern organization is increasingly influenced by its ability to manage cybersecurity incidents. Those with the right…

Anatomy of a Modern Ransomware Attack

Anatomy of a Modern Ransomware Attack

Ransomware is a serious issue for companies all over the world. From SMBs and startups to multinational enterprises, this particular…

How to build a cloud security observability strategy

How to build a cloud security observability strategy

Cloud computing is changing the way organizations operate. With a vast expansion of storage space, unprecedented flexibility, and more scope…

Penetration testing vs vulnerability scanning: what’s the difference?

Penetration testing vs vulnerability scanning: what’s the difference?

Often confused as the same thing, penetration testing and vulnerability scanning both bring dedicated attack services to help protect an…

How to select an MDR service that’s right for your company

How to select an MDR service that’s right for your company

With the cybersecurity landscape changing at such a rapid rate as well as the threat of cyber-attacks and increasing reality,…

Cloud forensic analysis: all you need to know

Cloud forensic analysis: all you need to know

What you need to know about the cloud forensic analysis process The shift towards the cloud is happening at an…