From Logs to IDS We have always known that the audit logs generated by systems are a key source of i...
Cybersecurity Blog
This is what we are passionate about and we want to
share it with you
We live in a digital era where business processes are carried out through apps and web applications....
Reviewing the article published in Forbes magazine in March: "The road to gender equality, a struggl...