At Ackcent, we are always striving to offer the best solutions on the market to our customers and we are committed to the continuous expansion of our partner portfolio.
We are continuing to expand our portfolio of the technological partners who help us to complement the services we offer to our customers.
Once upon a time there was a company who had three computers within its infrastructure. The first computer was placed on the DMZ and was configured by default by the IT Manager.
GDPR is meant to be complied with by each data controller and data processor within the European Union (EU)
Ackcent and Cylance got together last Thursday in Barcelona to celebrate the first cybersecurity lunch of the year.
This November we will once again witness the unstoppable digital transformation that cities were undergone at Smart City Expo Empower Cities, Empower People
Mathy Vanhoefm published a set of attacks against the Wi-Fi security protocol WPA2 with the name Key Reinstallation Attacks, or KRACKS.
Get resources in your mailbox for free
When we started the process of naming Ackcent, we wanted to find a brand name that could convey the expertise and passion of our team and the essence of our company.
Between September 6 and 9, the second radare2 conference (r2con) took place in Barcelona. This security conference is mainly focused in radare2, an open-source framework for reverse engineering with a great and active community.
To be the best at anything requires a firm determination from the outset. And when that determination is accompanied by the belief that you have the potential to achieve your aim
Cloud services irruption such as Amazon Web Services, Microsoft Azure and Google Cloud Platform among others makes possible to confirm that it is one of the most revolving computer paradigms ever
The internet is full of bad guys that are constantly scanning all IP addresses looking for unpatched services, misconfigured servers, or simply gathering information from new targets.