In the late 1990s, the Internet was still small, slow, and accessible to a select few. Back then, being a " geek " meant having a technical knowledge that seemed...
Sometimes, when you think about it, you wonder how we take the world around us for granted. Like, we click, scroll, type, and it all seems so natural, as if...
In recent months, Latin America and the Caribbean have become the most targeted region by cyberattacks globally, surpassing Africa in terms of overall risk. This data emerges from the latest...
Today is January 28th, and like every year for quite some time now, we find ourselves celebrating European Data Protection Day. It's something that started around 2006, to commemorate the...
There's this mistaken—somewhat romantic, if you will—idea that ransomware is "IT stuff": a few servers in trouble, a couple of sleepless nights, then you restart and it's over… The reality,...
In our previous article, we explored how the cybersecurity professional's role as guarantor clashes with classic scenarios such as unauthorized access. However, in my professional and academic experience, I often...
This article is the first in a series of three articles exploring the delicate relationship between cybersecurity professionals and the current regulatory framework. In this first installment, we will analyze...
One of the most common mistakes, despite the GDPR's implementation since 2018, is to consider only security breaches involving sensitive data as data breaches. This is often a fatal error...
In the world of cybersecurity, we often talk about attacks, vulnerabilities, and incidents. Less is said about a silent variable that runs through the entire sector: fatigue . Not end-of-day...
San Francisco: January 9, 2007 There was something strange about the air, like when you know something's about to happen but you don't know what. Steve Jobs was on stage...