Cybersecurity ManualCyber attacks targeting childrenThere is no widely recognized evidence to suggest that Hamas has conducted significant cybersecurity attacks against Israel. The conflict…Nov 24, 2023Nov 24, 2023
Cybersecurity ManualCuba: Bloqueo o embargoHe perdido la cuenta de las veces que he escuchado o leído a diario la palabra bloqueo en el mal llamado sistema informativo de la…Nov 6, 2022Nov 6, 2022
Cybersecurity ManualMost secure encryption standardsTechnically any encryption algorithm can be deciphered. But a top algorithm like AES 256, hasn’t been cracked so far. The computing power…May 30, 2020May 30, 2020
Cybersecurity ManualWhat happens after an organization pays the ransomware ransom demand?Ransomware attacks are becoming more sophisticated. Recently, IT services giant Cognizant has suffered an attack that may end up costing…May 26, 2020May 26, 2020
Cybersecurity ManualNIST FRAMEWORK FOR IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITYThis year 2020, 50 percent of U.S. organizations will be adopting the NIST Cybersecurity Framework (CSF), according to the information…May 23, 2020May 23, 2020
Cybersecurity ManualHow to stay HIPAA compliant during COVID 19When a rising number of patients continuously arrive in healthcare institutions, during a nationwide public health emergency, and with…Apr 20, 2020Apr 20, 2020
Cybersecurity ManualQuantum Computing open-source ProjectsThere is a wide range of open-source software for quantum computing around the world. They are implemented in different programming…Apr 17, 2020Apr 17, 2020
Cybersecurity ManualTHE USE OF QUANTUM COMPUTING IN CYBERSECURITYWhen we analyze the influence of quantum computing in the future of cybersecurity, two possible scenarios arise. One is chaotic and…Apr 9, 2020Apr 9, 2020