Are You Crypto-Agile to Respond Quickly to Changing Cyberthreats?
A business is considered agile if it is able to respond quickly to market changes, adapt to maintain stability. However, without cryptography there is no security and without security there is no...
View ArticleElevenPaths Radio English #4 – Privacy and Personal Data Protection
Privacy and personal data protection are two of the greatest concerns today due to the large amount of information leaking out to the media every day. Practically all big companies today have large...
View ArticleBusiness Continuity Plan: From Paper to Action
Medium and large companies that must comply with industry or national standards and controls have had to develop what is known as a BCP (Business Continuity Plan). Through it, experts in the company’s...
View ArticleWhatsApp terms and conditions update – a cheeky move?
Surely by now many have already accepted the new terms and privacy policies without really knowing what they were about or their impact on the privacy of their data, and many others have even decided...
View Article4 Tips to Secure Your Data
We surf the Internet on a daily basis. Many of us are already considered digital natives. Yes, it is almost an extension of us, but are we really aware of the scope of our use of it? How do we use it?...
View ArticleDigital Zombies and Social Engineering
This post is about zombies and social engineering, the image in figure 1 is free and royalty free as long as you credit it, and I loved it. We all probably know how is the night before the delivery of...
View ArticleWhatsApp, Telegram or Signal, Which One?
In the world of smartphones, 2021 began with a piece of news that has left no one indifferent: the update of WhatsApp’s terms and conditions of use. This measure, which was set by Facebook to come...
View ArticleNobody on The Internet Knows You Are A Dog, Even If You Use TLS Certificates
You may have noticed that most websites have a little padlock on them. If you click on it, a window will pop up stating that “the connection is secure”. Secure? What kind of secure? How secure? In...
View ArticleEverything You Need to Know About SSL/TLS Certificates
What is a digital certificate? Secure Sockets Layer/Transport Layer Security digital certificate is the most widely used security protocol that enables encrypted data transfer between a web server and...
View ArticleCyber Security Mechanisms for Everyday Life
It is becoming more and more common to find in the general media news related to cyber-attacks, data breaches, privacy scandals and, in short, all kinds of security incidents. These incidents are not...
View ArticleWhat is VPN and What is It For?
VPN connections are nothing new, they have been with us for a long time, always linked to the business world. The great versatility and its different uses have made more and more people use...
View ArticleTop 4 Programming Languages for Beginners
Have you set yourself new challenges this year but don’t know where to start? How would you like to become an expert in programming? We know that, at first, it may sound a bit complicated and arduous....
View ArticleDo I Really Need an Antivirus?
Cyber security is one of the most popular topics due to its unstoppable growth and development, and its presence in the media is becoming more and more frequent, mainly news about the discovery of...
View ArticleTips to Download Apps Securely
The arrival of smartphones brought about a paradigm shift in the way we use and consume content through mobile devices. So much so that, from that moment on, they went from being conceived solely as...
View Article--- Article Not Found! ---
*** *** *** RSSing Note: Article is missing! We don't know where we put it!!. *** ***
View Article