recent publications

From a Log to the Threat Hunting

Post-quantum cryptography challenges for organizations

read
From a Log to the Threat Hunting

Security architecture: basic principles

read
From a Log to the Threat Hunting

Toward a Science of Cybersecurity

read
From a Log to the Threat Hunting

Methodology of Tabletop Exercises

read
Follina a silent Client-Side

Forgotten Protocols: IPMI

read
From a Log to the Threat Hunting

Design Thinking applied to Cybersecurity

read
From a Log to the Threat Hunting

Vulnerability Assessment

read
From a Log to the Threat Hunting

Introduction to the electromagnetic and radioelectric spectrum, how does it affect security?

read
From a Log to the Threat Hunting

OWASP Guide to APIs 2023

read
From a Log to the Threat Hunting

Purple teaming: Operations and Nuances

read
From a Log to the Threat Hunting

CVSSv4 and the pursuit of precision

read

Cybersecurity in the fourth Industrial Revolution (Industry 4.0)

read

Cyber Security guide for gamers

read
Artificial intelligence in Cybersecurity

Artificial intelligence in Cybersecurity

read
Why use flow data for monitoring?

Why use flow data for monitoring?

read
From a Log to the Threat Hunting

The Shock wave of Data Breaches(The T-Mobile case)

read