-
The acceleration of artificial intelligence, the rise of autonomous threats, and a more demanding regulatory environment are forcing organizations to evolve toward adaptive security models and r...
-
Experts emphasize that integrating cybersecurity into business strategy, beyond compliance, is key to protecting operations, reputation, and growth in an environment of growing threats.
-
When Lucía Gil enters her shift at Var Group's SOC to look after her clients' cybersecurity, she doesn't need to look at screens full of alerts. Her way of working is not by sight, but by ...
-
Tech Show Madrid: For those who don't know Var Group yet, could you tell us briefly what the company represents in the technology landscape? Esther Lekunberri: We are a European technology group co ...
-
SIT Spain, a benchmark in specialized logistics, has adapted its processes to the challenge of moving technology and information with the highest security standards. Its commitment to innovation has ...
-
IT security is no longer just for large corporations. Every day we see how small and medium-sized companies are also targets of cyber-attacks, and many times they do not have the necessary resources ...
-
Consist España strengthens its leadership in cybersecurity with a strategy that protects from the inside perimeter in anticipation of the new regulatory and operational risks of the digital environment: monitoring and ...
-
Ransomware has continued to evolve, but one thing remains the same: companies are still falling for the same old mistakes. Despite advances in cybersecurity, most ransomware attacks are still ...
-
Last January, the European financial sector activated one of the most ambitious cybersecurity regulations: the Digital Operational Resilience Act (DORA). The regulation, promoted by the European ...
-
The transition to renewable energy sources, such as solar plants and wind farms, has revolutionized the energy sector. However, this digitization and growing interconnectedness have brought with them a ...
-
Internet of Things (IoT) devices are everywhere. From smart thermostats to surveillance cameras and voice assistants, their presence in homes and offices has grown from ...
-
Ransomware-as-a-service (RaaS) has changed the rules of the game in cybercrime. This model allows virtually anyone, even without advanced technical knowledge, to launch ...
-
The advent of quantum computing is drawing ever closer. And with it, a real threat to the encryption systems that today protect data around the world. From banking transactions to ...
-
Generative artificial intelligence is transforming the cybersecurity landscape. These innovative tools are being used both to develop advanced protection solutions and ...
-
The veracity of digital identities has become an essential priority for technology organizations and governments. With the expansion of digital services, the rise of digital intelligence and the ...
-
The adoption of the cloud is no longer a passing trend, but the axis on which digital transformation is built. However, in a landscape where most organizations are betting on ...
-
Digitalization has radically transformed supply chains, but it has also exposed them to a new type of threat: cyber-attack. Today's interconnectedness, which offers us ...
-
In today's complex and dynamic digital landscape, where teleworking has established itself as a common practice, the cloud is the backbone infrastructure of many companies and the number of devices that can be ...