Does Your Company Have a Good Vulnerability Management System?

Vulnerability management consists of services for detecting and managing elements that could be vulnerable on IT systems in corporative environments. ...
Leer más

Noticias, actualidad, tecnología. Explora todos nuestros artículos.

Are You Keeping Your Microsoft Office 365 Data Protected?

Are You Keeping Your Microsoft Office 365 Data Protected?

Entrusting your Office 365 backups to Microsoft native tools is not enough ...
Read More »
World Day of Telecommunications

World Day of Telecommunications

Each year a topic on which to work is decided and this time the topic is the Internet and elderly people ...
Read More »
Are You Testing Your Cybersecurity Controls?

Are You Testing Your Cybersecurity Controls?

There are many practices that companies must carry out periodically and among them there's that of evaluating cybersecurity services. But how? With a pentesting analysis service. ...
Read More »
Do You Understand Your Cloud Bill?

Do You Understand Your Cloud Bill?

Hiring cloud services on a budget and finding out over time that the budget you set doesn't match the bill is more common than you'd think. Understanding a cloud bill is not easy task but there's always a solution. ...
Read More »
The European Union Data Governance Act

The European Union Data Governance Act

The DGA intends to promote and increase EU online data exchange through regulations on data protection and its different methods ...
Read More »
When a poor backup almost deprives us from Toy Story 2

When a poor backup almost deprives us from Toy Story 2

Despite that at first they tried to make us believe it was a myth, later Pixar itself recognized they had severe problems with Toy Story 2 production. ...
Read More »
New Trans-Atlantic Data Privacy Framework between the EU and USA

New Trans-Atlantic Data Privacy Framework between the EU and USA

After of a year of negociations, the EU and the USA have come to an agreement through the Trans-Atlantic Framework of Data Privacy, that has come to replace the Privacy Shield. ...
Read More »
You Need to Protect Your Company's Data and Here We'll Tell You How

You Need to Protect Your Company's Data and Here We'll Tell You How

Avoid common mistakes that cause data loss and be smarter than ransomware ...
Read More »
Who is Who?  Office Roles

Who is Who? Office Roles

Given the amount of job position names we find, it is easy to get lost in definitions, but today we're going to see the main ones, as wellas the responsibilities they entail. ...
Read More »
Women at their Keyboards!

Women at their Keyboards!

Are you aware of the role women have played throughout technology history? Checking out the history of IT, we find the names of women without which IT and the world of technology would we very different. ...
Read More »

Items 11 to 20 of 70 total