This website uses its own and third-party cookies for collecting statistics and ensuring its proper functioning and display. For more information, please visit our Privacy Policy. If you continue browsing, we consider that you accept their use.
Disarming Cybercriminals: Free Tools to Prevent Social Engineering Attacks
Cybercriminals have a wide variety of techniques within their arsenal to carry out their Social Engineering attacks. If you act proactively, it will be very difficult for cybercriminals to perpetrate in your organization.
OWASP guide to avoid RANSOMWARE infections
This OWASP guide is intended as a checklist in order to avoid infection with Ransomware and, ultimately, to create proper procedures for information recovery.
How to develop a user-oriented security layer
To develop a user-oriented security layer, it is necessary to conduct a User Hardening process. Learn the basics of this process and how to carry it out in a practical way.