Friday, June 29, 2018

A concert, sports, hamburgers and social networks

The day you have been waiting for so long has finally arrived. Your favorite singer comes to town and you could not miss it. You bought your ticket months ago and now it is time to set everything up. New trainers to resist a few hours of non-stop jumping, sharing a picture on the social networks to inform about the hours remaining and eating some fast-food in the way before getting in line to be on the first row. 

But, maybe other groups, that are not the ones attending the concert, have access to all the personal data thanks to simple things such as buying new trainers of a specific brand, or getting a ticket through the internet.


Wednesday, June 27, 2018

The invisible enemy

It is very common in young children to cover their eyes or hide when facing situations that scare them. They believe that if they do not see the problem through their own eyes, it will just disappear. Something similar happens with web filtering. Web filtering software takes two principal kinds of clients into account: parents that want to avoid their kids’ access to unappropriated content and companies that wish to avoid their employees’ access to websites that are not related to their work activities. 

Making the malicious content invisible is a really common practice in companies in order to prevent their employees from visiting unreliable sites, so they can keep their information safe.


Monday, June 25, 2018

Excel table

Who has never found an Excel file with thousands of datum that he has not been able to face? Formulas, numbers, cells... And everything is there to facilitate the work and access and store datum in a more organized way. Of course, more organized in case the person knows how to work on these datum the right way. If that’s not the case, you can find yourself overwhelmed by digits, letters, and a disorganization that can put your work in danger.

According to Christopher Ott, a former senior counterintelligence and cyber counsel at the Department of Justice’s (DOJ) National Security Division, getting lost between metrics, datum and tools whose functions are unknown, entails a threat as big as not having them.


Friday, June 22, 2018

Ghosts of the past and the future

As in the famous "A Christmas Carol" by Charles Dickens, ghosts always come back. In this case, we are referring to the ghosts of cybersecurity. In this world, technological progress do not stop and with them, new vulnerabilities that put our information in danger show up.
Being updated about everything and an education applied to the workers of the organizations is essential in order to avoid falling into the same past mistakes and future troubles. 

Every day, new problems and vulnerabilities come up, which the cyber attackers use to get their objectives, but in other occasions ‘’old ghosts from the past’’ take advantage of those vulnerabilities that were not solved in time again.


Wednesday, June 20, 2018

The employee of the month

Many organizations count on monthly award programs with the goal of recognizing the achievements and efforts of their members. The employee of the month turns to be the reference worker of the companies thanks to his/hers good work. Companies show bigger compromises towards their contributors day by day and develop endless activities with the goal of encouraging motivation and strengthen the commitment ties. But, what happens with the rest of the employees?


According to the poll made by Ipsos, 1 out of every 3 workers in the USA admits a potentially risky behavior at work. A really worrying fact that brings up important security problems for American companies.


Monday, June 18, 2018

Anticipate the threats

We live in a time where jewelry theft is forgotten and we can only see it in 90’s movies. Nowadays, data stealing is the trend. Thieves are not going into museums looking for the biggest diamonds, but into digital ecosystems.  These threats are way more difficult to manage. From a terrorist attack to a natural disaster, are the consequences that these stealing can lead to. We are all in danger in one way or another. The diamonds stealing in an American way is no longer remembered and now, a new kind of thieve is the thief of the XXI century.



Everbridge, the company is charge of these critical events helps governments and companies not only to react but to get ready and to anticipate to possible threats. Javier Colado, SVP of International Sales at Everbridge, shows us how the company works with companies when attacks happen or when they have not happened yet.


Friday, June 15, 2018

3 of the big ones

Russia, the United States and North Korea, three of the countries which are on our screens every day. They are currently three of the world powers that occupy the front pages in all the newspapers of the world in economic, social and political topics, and not precisely because of their good relationship. Tension is felt on the air and it would not be less in cybersecurity terms. ¿Are we going to abandon traditional war in order to initiate a cyberwar? The first steps are already taking place...


The relationships between Russia, The United States and North Korea regarding cybersecurity, are hidden. Invisible and suspicious attacks, and not a clear attacker, these are the characteristics that set this week’s actuality.


Wednesday, June 13, 2018

An express kidnapping

In most cop thriller movies, bank robbers’ modus operandi consists on getting into a bank with guns so that, within the shortest possible time,  the employees have to get bundles of bills into bags, and then running away from the crime scene as soon as possible. Each one might be different, but it always pursues the same goal: to get the loot in a few minutes and get away without raising suspicions and with the minimum consequences. 


This is the situation that many businesses face at some point if their systems are not properly protected. They might find the message ‘’all the files in your computer have been blocked. Pay for their ransom within 24 hours in order to get the key, otherwise…’’


Monday, June 11, 2018

Guess who?

I am sure that when you were a kid, you must have played the famous ‘Guess Who’ over a million times, the game in which you had to try and guess the character your rival was hiding. Through some questions you had to eliminate options till you hit the nail on the head. In the world of cybersecurity, games do not exist. Every single attack has an origin and a cyber attacker behind, which in this case, cannot be found through some simple questions. Behind every cyber attack there is an executor, but what if the origins came from a State?


Every important cyberattack is followed by the question of ‘who is behind this? ‘what they want to achieve?’, and most importantly, whether the attack is sponsored by any state or nation. This states, such as Russia, China, or North Korea, are usually the principal suspects of these attacks. But, is the idea of cyber attacks being sponsored by the states too exaggerated?


Friday, June 8, 2018

One goal for the squad

A few days are left before the 2018 Football World Cup takes place in Russia and more people can be seen with their football team t-shirt supporting their team and their country. A lot of tourists are going to spend their holidays in Russia as real football fans, but in this event there’s a team you didn’t know about. When players are focused on winning the games, a lot of hackers are waiting for the perfect moment to score. 


When connecting to a public network, when you don’t know the signal is coming or by trusting the apps you use every day, you’re risking your information.


Wednesday, June 6, 2018

The leader of the battle against cybersecurity

In the movie 300, Spartan King Leonidas and his 300 warriors fight to the death against the “god-king” Jerjes I and his army of more than 100.000 soldiers. A battle in inequality in which Leonidas is the thinking mind that must think of tactics to win the war. You can’t win the battle without a plan, knowing the opponent, establishing a strategy and choosing a leader. In cybersecurity world it happens the same, the number of enemies is much more than 100.000 and it’s were battles are fight every day. As a company, you have the chance to create a team manager and fight the enemy. 

Because of a lack of talent in cybersecurity, it can paralyze companies, but, what if we teach a person to lead a team?



Monday, June 4, 2018

Everyone to his own taste

As in every aspect in our lives, a good advice in time or knowing other’s points of view about how they think of you can help you make decisions. In cybersecurity world, points of view and opinions are also necessary. In most occasions, it’s a teamwork that can have its pros and cons, but it always should focus on the problem and that problem in security. 


Increasing the diversity in cybersecurity equipment can increase their capacity to solve cybersecurity challenges by thinking diversity. This is explained by Grant Bourzikas. CISO in McAfee.


Friday, June 1, 2018

A new game in the video game

It’s the 80s, where Space Invaders appeared for the first time, a video game whose goal was to eliminate alien spaceships with a laser canyon in order to obtain the highest score possible.  Alien spaceships that want to invade a planet. Classic. In cybersecurity, it happens just the same. It’s not about attacking; it’s about defending your privacy and data so that the dangerous aliens won’t get them. 

This week has been decisive in the cybersecurity world, after the implementation of the GDPR (General Data Protection Regulation) and news that have affected the sector.