5 consejos para evitar los ciberataques en plataformas de EdTech

A medida que continúa la pandemia de COVID-19, muchas instituciones educativas se han visto obligadas a cambiar sus clases presenciales a clases virtuales. Varias plataformas de EdTech también han lanzado clases gratuitas que han incitado a los estudi… Continue reading 5 consejos para evitar los ciberataques en plataformas de EdTech

Security operations center, Part 3: Finding your weakest link

Any organization with data assets is a possible target for an attacker. Hackers use various forms of advanced cyberattack techniques to obtain valuable company data; in fact, a study by the University of Maryland showed that a cyberattack takes place …… Continue reading Security operations center, Part 3: Finding your weakest link

 Security operations center, Part 2: Life of a SOC analyst 

In the first part of this blog series, we saw a brief overview of what a security operations center (SOC) is and how it operates. In this part, we’ll take a look at the typical activities that SOC analysts carry …
The post  Security operations center, … Continue reading  Security operations center, Part 2: Life of a SOC analyst 

Sophisticated phishing

Most of us can think of a time when we received a phishing email. In fact, most phishing emails are easy to identify, and automatically go to spam.
However, in this ongoing pandemic, hackers are adopting advanced tactics that cleverly …
The post Sophis… Continue reading Sophisticated phishing