CATEGORIES

Ciberseguridad

Conociendo los beneficios de la nube

In today’s world of enterprise IT, there are many factors that a company must consider in order to decide whether a cloud infrastructure is the right fit. Conversely, there are many companies that are unable make the leap into the cloud, instead relying on their...

La dependencia de la tecnología está creciendo

Critical sectors such as transport, energy, health and finance have become increasingly dependent on digital technologies to run their core business. While digitalisation brings enormous opportunities and provides solutions for many of the challenges Europe is facing,...

¿Cómo beneficia a tu organización la gestión de Cuentas Privilegiadas?

Privileged Account Management is considered by many analysts and technologists as one of the most important security projects for reducing cyber risk and achieving high security ROI. Based on recent threat activity, privileged accounts, not corporate data, might be...

Privilegios mínimos

The 2020 Global State of Least Privilege Report shows that two-thirds of organizations now consider the implementation of least privilege a top priority in achieving a zero-trust security model. Below, we take a look at some of the critical drivers for the adoption of...
Hacia la nube

Hacia la nube

Digital transformation, Competitive advantage and saving money are driving factors for any organization moving to the cloud. However, many organizations still need to support their business-critical...

leer más
Conociendo los beneficios de la nube

Conociendo los beneficios de la nube

In today’s world of enterprise IT, there are many factors that a company must consider in order to decide whether a cloud infrastructure is the right fit. Conversely, there are many companies that are unable make the leap into the cloud, instead relying on their...

Privilegios mínimos

Privilegios mínimos

The 2020 Global State of Least Privilege Report shows that two-thirds of organizations now consider the implementation of least privilege a top priority in achieving a zero-trust security model. Below, we take a look at some of the critical drivers for the adoption of...