Connect

Join us Contact

Partner Blog

How to avoid being the next victim of fake news?

How to avoid being the next victim of fake news?

By Sebastián Stranieri, CEO VU Security The concept of disinformation is not new. The manipulation of news has been part of history almost as long as the media has existed. However, with the advancement of new technologies and the global reach that...

World Cyber Security Day 2019

World Cyber Security Day 2019

Cybersecurity should be part of the general culture and fundamentally business, being that it is the basis of digital trust. Awareness should be permanent among all employees of organizations and should include the public in the process.

Importance of information security in the organization

Importance of information security in the organization

The importance of information security in the organization is crucial to keep companies operational. A fall in it can generate a deep impact on the development of activities, even destabilizing all areas. What is the...

Digital Transformation Process: Beyond Biometrics

Digital Transformation Process: Beyond Biometrics

By Sebastián Stranieri, CEO of VU Digital transformation is the new star of the fintech world. Everyone has heard of it, although they don't necessarily know what it is or what it does. In many cases, banks have implemented...

Guardium Named a Leader by Forrester

Guardium Named a Leader by Forrester

Guardium received the highest possible scores (5/5) for its masking and management capabilities, its APIs and integrations, data intelligence and inspection capabilities, with its market focus, roadmap and associated ecosystem. IBM Guardium protects...

Tips for a successful SIEM

Tips for a successful SIEM

IBM has held its annual security event, Security Summit in Argentina on September 12 at El Planetario in Buenos Aires. Together with more than 200 clients and business partners, possible scenarios that could result from a cyberattack were presented in order to help...

Why is 5G important?

Why is 5G important?

What started as the portability of telephony became, over time, something much more significant. Cell phones evolved to the point where they are now considered almost inseparable parts of the modern man and woman. Their role as...

The Network Engineer in the Software Age

The Network Engineer in the Software Age

However, the skills that engineers need to have are not outside the scope of the transformation either. Personally, I still remember that when I was starting out in the networking world, where I studied there was a pretty clear map of careers with certifications...

The powerful botnet reappears

The powerful botnet reappears

Researchers at security firm Cofense identified in August that the command and control servers associated with Emotet were active, although the botnet remained dormant. Based on additional research conducted by analysts at...

What information is a hacker looking for and what does he do with it?

Different studies and reports in Latin America show that, in terms of cybercrime prevention, awareness and investment is still insufficient and the actions implemented are sometimes precarious. If we take into account that the detection of a cybercrime problem is...

Zero Day Attacks: what are they and how to protect ourselves?

Zero Day Attacks: what are they and how to protect ourselves?

Recently, citizens from all over the world were alerted to an alleged vulnerability in WhatsApp that allowed something to be installed on the device without the user noticing it. The vulnerability is a perfect example of what is known as a zero day...