Ethical Hacking: What is it and how is it useful for cybersecurity?
Sergio Darias Pérez  |  07 February 2023

What is ethical hacking and why does it play an important role in the strategy of CISOs and security technicians?

Read more
Cybersecurity for Telework: What should you know?
Sergio Darias Pérez  |  21 September 2022

Can you ensure your IT security in and out of the office? Cybersecurity in teleworking should be your priority

Read more
Why is Microsoft a leader in security?
Aitor Berjano González  |  01 September 2022

Why has Microsoft become a worldwide security benchmark company? In this post we tell you all the reasons why!

Read more
About disabling Basic Auth in Exchange Online
Marta Vila Gómez  |  01 August 2022

Did you know that on October 1, 2022, Basic Auth will be permanently deactivated for all tenant clients that are still using it ?

Read more
Creating a Rule in Microsoft Sentinel to Detect a ZuoRAT Malware Infection
Marta Vila Gómez  |  26 July 2022


We show you how to know if your device has been infected with the ZuoRat malware through an "Analytics Rules" query in Microsoft Sentinel. 



Read more
What should a SIEM and SOAR security analytics service include?
Sergio Darias Pérez  |  23 June 2022

What features should a SIEM system have? What differentiates a traditional SIEM from a Cloud SIEM? We tell you all about it

Read more
Information security for Office 365 with Microsoft Defender
Sergio Darias Pérez  |  19 May 2022

Learn all that Microsoft Defender for Office 365 can do - a holistic solution for preventing, protecting against and countering malicious attacks.

Read more
What is a SOC or Security Operations Center for?
Sergio Darias Pérez  |  09 May 2022

Information security is a company's most vital asset and a SOC service will shield, analyze and prepare your systems against cyber-attacks.




Read more
What do you need to know about OSCP certification?
Sergio Darias Pérez  |  05 May 2022

What is OSCP Certification and what does it mean in terms of IT security? How to obtain it and what should the applicant's profile be like? We tell you all about it!

Read more
Pentesting for dummies
Marta Vila Gómez  |  20 April 2022

In this article you will find out what a penetration analysis pentest is, what types there are, its phases and what differentiates it from a Red Team.

Read more
Enabling web content filtering in Microsoft Defender for Endpoint
Alberto Mendoza  |  06 April 2022

Web content filtering is part of the web protection features in Microsoft Defender for Endpoint. Here's how to do it.

Read more
Protect your documentation with Azure Information Protection
Sergio Darias Pérez  |  28 February 2022

AIP is the Microsoft service that will help you protect all corporate documentation by classifying, labeling and protecting all information.

Read more