Monday, June 18, 2018

Anticipate the threats

We live in a time where jewelry theft is forgotten and we can only see it in 90’s movies. Nowadays, data stealing is the trend. Thieves are not going into museums looking for the biggest diamonds, but into digital ecosystems.  These threats are way more difficult to manage. From a terrorist attack to a natural disaster, are the consequences that these stealing can lead to. We are all in danger in one way or another. The diamonds stealing in an American way is no longer remembered and now, a new kind of thieve is the thief of the XXI century.



Everbridge, the company is charge of these critical events helps governments and companies not only to react but to get ready and to anticipate to possible threats. Javier Colado, SVP of International Sales at Everbridge, shows us how the company works with companies when attacks happen or when they have not happened yet.


Friday, June 15, 2018

3 of the big ones

Russia, the United States and North Korea, three of the countries which are on our screens every day. They are currently three of the world powers that occupy the front pages in all the newspapers of the world in economic, social and political topics, and not precisely because of their good relationship. Tension is felt on the air and it would not be less in cybersecurity terms. ¿Are we going to abandon traditional war in order to initiate a cyberwar? The first steps are already taking place...


The relationships between Russia, The United States and North Korea regarding cybersecurity, are hidden. Invisible and suspicious attacks, and not a clear attacker, these are the characteristics that set this week’s actuality.


Wednesday, June 13, 2018

An express kidnapping

In most cop thriller movies, bank robbers’ modus operandi consists on getting into a bank with guns so that, within the shortest possible time,  the employees have to get bundles of bills into bags, and then running away from the crime scene as soon as possible. Each one might be different, but it always pursues the same goal: to get the loot in a few minutes and get away without raising suspicions and with the minimum consequences. 


This is the situation that many businesses face at some point if their systems are not properly protected. They might find the message ‘’all the files in your computer have been blocked. Pay for their ransom within 24 hours in order to get the key, otherwise…’’


Monday, June 11, 2018

Guess who?

I am sure that when you were a kid, you must have played the famous ‘Guess Who’ over a million times, the game in which you had to try and guess the character your rival was hiding. Through some questions you had to eliminate options till you hit the nail on the head. In the world of cybersecurity, games do not exist. Every single attack has an origin and a cyber attacker behind, which in this case, cannot be found through some simple questions. Behind every cyber attack there is an executor, but what if the origins came from a State?


Every important cyberattack is followed by the question of ‘who is behind this? ‘what they want to achieve?’, and most importantly, whether the attack is sponsored by any state or nation. This states, such as Russia, China, or North Korea, are usually the principal suspects of these attacks. But, is the idea of cyber attacks being sponsored by the states too exaggerated?


Friday, June 8, 2018

One goal for the squad

A few days are left before the 2018 Football World Cup takes place in Russia and more people can be seen with their football team t-shirt supporting their team and their country. A lot of tourists are going to spend their holidays in Russia as real football fans, but in this event there’s a team you didn’t know about. When players are focused on winning the games, a lot of hackers are waiting for the perfect moment to score. 


When connecting to a public network, when you don’t know the signal is coming or by trusting the apps you use every day, you’re risking your information.