Our website uses our own and third-party cookies both for the collection of statistics and for the correct operation and visualization of it. For more information, visit our Privacy Policy. If you continue browsing, we will assume that you accept their use.
Disarming Cybercriminals: Free Tools to Prevent Social Engineering Attacks
Cybercriminals have a wide variety of techniques within their arsenal to carry out their Social Engineering attacks. If you act proactively, it will be very difficult for cybercriminals to perpetrate in your organization.
OWASP guide to avoid RANSOMWARE infections
This OWASP guide is intended as a checklist in order to avoid infection with Ransomware and, ultimately, to create proper procedures for information recovery.
How to develop a user-oriented security layer
To develop a user-oriented security layer, it is necessary to conduct a User Hardening process. Learn the basics of this process and how to carry it out in a practical way.