Contact Us Get an assesment

Trust in security with us

Filter by

Ackcent attends the International RSA Conference 2018 in San Francisco

Ackcent attends the International RSA Conference 2018 in San Francisco

At Ackcent, we are always striving to offer the best solutions on the market to our customers and we are committed to the continuous expansion of our partner portfolio.

Duo Security, Ackcent’s strategic partner

Duo Security, Ackcent’s strategic partner

We are continuing to expand our portfolio of the technological partners who help us to complement the services we offer to our customers.

Las Tres Computadoras y el hacker ético de Ciberseguridad Ackcent

Las Tres Computadoras y el hacker ético de Ciberseguridad Ackcent

Once upon a time there was a company who had three computers within its infrastructure. The first computer was placed on the DMZ and was configured by default by the IT Manager.

Seven tips for compliance with the General Data Protection Regulation (GDPR)

Seven tips for compliance with the General Data Protection Regulation (GDPR)

GDPR is meant to be complied with by each data controller and data processor within the European Union (EU)

Ryan Permeh, Cylance’s Co-Founder, attended the Ackcent Cybersecurity Lunch

Ryan Permeh, Cylance’s Co-Founder, attended the Ackcent Cybersecurity Lunch

Ackcent and Cylance got together last Thursday in Barcelona to celebrate the first cybersecurity lunch of the year.

Hacking the Smart City

Hacking the Smart City

This November we will once again witness the unstoppable digital transformation that cities were undergone at Smart City Expo Empower Cities, Empower People

KRACK or “How WPA2 did not die”

KRACK or “How WPA2 did not die”

Mathy Vanhoefm published a set of attacks against the Wi-Fi security protocol WPA2 with the name Key Reinstallation Attacks, or KRACKS.

Where does the name Ackcent come from?

Where does the name Ackcent come from?

When we started the process of naming Ackcent, we wanted to find a brand name that could convey the expertise and passion of our team and the essence of our company.

r2wars: Shall we play a game?

r2wars: Shall we play a game?

Between September 6 and 9, the second radare2 conference (r2con) took place in Barcelona. This security conference is mainly focused in radare2, an open-source framework for reverse engineering with a great and active community.

The World’s Best Hacking Company

The World’s Best Hacking Company

To be the best at anything requires a firm determination from the outset. And when that determination is accompanied by the belief that you have the potential to achieve your aim

Cloud forensic analysis, challenges and difficulties

Cloud forensic analysis, challenges and difficulties

Cloud services irruption such as Amazon Web Services, Microsoft Azure and Google Cloud Platform among others makes possible to confirm that it is one of the most revolving computer paradigms ever

ELK on a Raspberry Pi

ELK on a Raspberry Pi

The internet is full of bad guys that are constantly scanning all IP addresses looking for unpatched services, misconfigured servers, or simply gathering information from new targets.