Migrating to the cloud is a massive step for any business to take. As a company moves to and expands…
Cloud computing is changing the way we do business. It's estimated that 60% of all corporate data is stored on…
Endpoints are the cybersecurity "front line" against malware attacks. Learn best practices to keep your business safe and find out more about our EDR solution.
The security professional's job has become an endless game of cat-and-mouse, continually pursuing invisible attackers that can out-think, out-run and outsmart most security systems.
In this post we will cover the basics of Event Logging in Linux systems. We will talk about Syslog: Message structure, the most famous implementations and main configurations.
Mathy Vanhoefm published a set of attacks against the Wi-Fi security protocol WPA2 with the name Key Reinstallation Attacks, or KRACKS.
Get resources in your mailbox for free
Cloud services irruption such as Amazon Web Services, Microsoft Azure and Google Cloud Platform among others makes possible to confirm that it is one of the most revolving computer paradigms ever